What other step is just as important?
During a recovery procedure, one important step is to maintain records of important events that happen during the procedure. What other step is just as important?
How often should a disaster recovery and business continuity plan be tested?
How often should a disaster recovery and business continuity plan be tested?
What is the first step in developing a disaster recovery plan?
What is the first step in developing a disaster recovery plan?
What procedures should take place to restore a system and its data files after system failure?
What procedures should take place to restore a system and its data files after system failure?
Which of the following is not one of these items?
Business continuity planning needs to provide several types of functionalities and protection types for an organization. Which of the following is not one of these items?
i.Provide an immediate and appropriate response to emergency situations
ii. Protect lives and ensure safety
iii. Reduce business conflicts
iv. Resume critical business functions
v.Work with outside vendors during the recovery period
vi. Reduce confusion during a crisis
vii. Ensure survivability of the business
viii. Get "up and running" quickly after a disaster
Which of the following does not take place during the implementation phase of SDLC?
Which of the following does not take place during the implementation phase of SDLC?
Which of the following best describes the security differences between Java and ActiveX?
Which of the following best describes the security differences between Java and ActiveX?
The __________mediates access to system resources to ensure an applet’s code behaves and stays within it
The __________mediates access to system resources to ensure an applet’s code behaves and stays within its own sandbox.
Which of the following best describes the corruption of an Internet server’s domain name system table?
Which of the following best describes the corruption of an Internet server’s domain name system table?
Which of the following attack types would this best thwart?
John has been told to turn off all scripting capabilities within his webbrowser. Which of the following attack types would this best thwart?