When performing a business impact analysis (BIA), which of the following should calculate the recovery time an
When performing a business impact analysis (BIA), which of the following should calculate the recovery time and cost estimates?
When an organization is using an automated tool to manage and house its business continuity plans, which of th
When an organization is using an automated tool to manage and house its business continuity plans, which of the following is the PRIMARY concern?
Which of the following is MOST important when deciding whether to build an alternate facility or subscribe to
Which of the following is MOST important when deciding whether to build an alternate facility or subscribe to a third-party hot site?
The FIRST priority when responding to a major security incident is:
The FIRST priority when responding to a major security incident is:
Which of the following would be the GREATEST weakness in recovery capability?
A company has a network of branch offices with local file/print and mail servers; each branch individually contracts a hot site. Which of the following would be the GREATEST weakness in recovery capability?
A desktop computer that was involved in a computer security incident should be secured as evidence by:
A desktop computer that was involved in a computer security incident should be secured as evidence by:
What is the BEST way to alleviate security team understaffing while retaining the capability in- house?
What is the BEST way to alleviate security team understaffing while retaining the capability in- house?
Which would be the BEST recommendation to protect against phishing attacks?
Which would be the BEST recommendation to protect against phishing attacks?
The information security manager should recommend which of the following?
An account with full administrative privileges over a production file is found to be accessible by a member of the software development team. This account was set up to allow the developer to download nonsensitive production data for software testing purposes. The information security manager should recommend which of the following?
Which of the following is the BEST approach for an organization desiring to protect its intellectual property?
Which of the following is the BEST approach for an organization desiring to protect its intellectual property?