cisa video for which of the following strategies is used to migrate data from a legacy system to a new system while both systems are operational?
Which of the following strategies is used to migrate data from a legacy system to a new system while both systems are operational?