Which of the following is the best way to ensure that a companys backup tapes can be used at a warm site?
Which of the following is the best way to ensure that a companys backup tapes can be used at a warm site?
The purpose of initiating emergency actions right after a disaster takes place is to prevent loss of life, att
The purpose of initiating emergency actions right after a disaster takes place is to prevent loss of life, attend to injuries, and __________.
Which of the following is the NIST document that was created for disaster recovery?
Which of the following is the NIST document that was created for disaster recovery?
What other step is just as important?
During a recovery procedure, one important step is to maintain records of important events that happen during the procedure. What other step is just as important?
How often should a disaster recovery and business continuity plan be tested?
How often should a disaster recovery and business continuity plan be tested?
What is the first step in developing a disaster recovery plan?
What is the first step in developing a disaster recovery plan?
What procedures should take place to restore a system and its data files after system failure?
What procedures should take place to restore a system and its data files after system failure?
Which of the following is not one of these items?
Business continuity planning needs to provide several types of functionalities and protection types for an organization. Which of the following is not one of these items?
i.Provide an immediate and appropriate response to emergency situations
ii. Protect lives and ensure safety
iii. Reduce business conflicts
iv. Resume critical business functions
v.Work with outside vendors during the recovery period
vi. Reduce confusion during a crisis
vii. Ensure survivability of the business
viii. Get "up and running" quickly after a disaster
Which of the following does not take place during the implementation phase of SDLC?
Which of the following does not take place during the implementation phase of SDLC?
Which of the following best describes the security differences between Java and ActiveX?
Which of the following best describes the security differences between Java and ActiveX?