PrepAway - Latest Free Exam Questions & Answers

Which of the following processes is used to identify relationships between mission critical applications, proc

Which of the following processes is used to identify relationships between mission critical
applications, processes, and operations and all supporting elements?

PrepAway - Latest Free Exam Questions & Answers

A.
Critical path analysis

B.
Functional analysis

C.
Risk analysis

D.
Business impact analysis

Explanation:
The critical path analysis is a process that is used to identify relationships between
mission critical applications, processes, and operations
and all supporting elements. Once this analysis is executed properly, a complete view of the
interdependencies and interactions is generated.
These interdependencies and interactions are required to maintain the organization. The result of
the critical path analysis process serves as
a list of items to secure.
Answer option C is incorrect. Risk analysis is the science of risks and their probability and evaluation
in a business or a process. It is an
important factor in security enhancement and prevention in a system. Risk analysis should be
performed as part of the risk management
process for each project. The outcome of the risk analysis would be the creation or review of the risk
register to identify and quantify risk
elements to the project and their potential impact.
Answer option D is incorrect. A business impact analysis (BIA) is a crisis management and business
impact analysis technique that identifies
those threats that can impact the business continuity of operations. Such threats can be either
natural or man-made. The BIA team should
have a clear understanding of the organization, key business processes, and IT resources for
assessing the risks associated with continuity.
In the BIA team, there should be senior management, IT personnel, and end users to identify all
resources that are to be used during normal
operations.
Answer option B is incorrect. The functional analysis process is used for converting system
requirements into a comprehensive function
standard. Verification is the result of the functional analysis process, in which the fundamentals of a
system level functional architecture are
defined adequately to allow for synthesis in the design phase. The functional analysis breaks down
the higher-level functions into the lower
level functions.


Leave a Reply