Business Continuity & Disaster Recovery Planning
SKILLSET
To ensure business can continue to operate during unusual circumstances, and to prepare to recover and maintain business during and after a disaster.
Related Questions
- Which of the following vulnerabilities occurs when an application directly uses or concatenates potentially hostile input with data file or stream functions?
- You are the project manager of the CUL project in your organization. You and the project team are assessing the risk events and creating a probability and impact matrix for the identified risks. Which one of the following statements best describes the requirements for the data type used in qualitative risk analysis?
- Which of the following components of configuration management involves periodic checks to determine the consistency and completeness of accounting information and to verify that all configuration management policies are being followed?
- ___________ is the science of protecting information by encoding it into unreadable format.
- Software Development Life Cycle (SDLC) is a logical process used by programmers to develop software. Which of the following SDLC phases meets the audit objectives defined below: System and data are validated. System meets all user requirements. System meets all control requirements.
- Numerous information security standards promote good security practices and define frameworks or systems to structure the analysis and design for managing information security controls. Which of the following are the U.S. Federal Government information security standards? Each correct answer represents a complete solution. Choose all that apply.
- Which of the following are the phases of the Certification and Accreditation (C&A) process? Each correct answer represents a complete solution. Choose two.
- Which of the following are examples of the application programming interface (API)? Each correct answer represents a complete solution. Choose three.
- Companies use some special marks to distinguish their products from those of other companies. These marks can include words, letters, numbers, drawings, etc. Which of the following terms describes these special marks?
- Which of the following specifies access privileges to a collection of resources by using the URL mapping?