Business Continuity & Disaster Recovery Planning
SKILLSET
To ensure business can continue to operate during unusual circumstances, and to prepare to recover and maintain business during and after a disaster.
Related Questions
- Which of the following types of activities can be audited for security? Each correct answer represents a complete solution. Choose three.
- Which of the following are Service Level Agreement (SLA) structures as defined by ITIL? Each correct answer represents a complete solution. Choose all that apply.
- Which of the following policies can explain how the company interacts with partners, the company's goals and mission, and a general reporting structure in different situations?
- Which of the following US Acts emphasized a "risk-based policy for cost-effective security" and makes mandatory for agency program officials, chief information officers, and inspectors general (IGs) to conduct annual reviews of the agency's information security program and report the results to Office of Management and Budget?
- In digital rights management, the level of robustness depends on the various types of tools and attacks to which they must be resistant or immune. Which of the following types of tools are expensive, require skill, and are not easily available?
- Which of the following ISO standards provides guidelines for accreditation of an organization that is concerned with certification and registration related to ISMS?
- Which of the following attacks causes software to fail and prevents the intended users from accessing software?
- You work as a Security Manager for Tech Perfect Inc. You have set up a SIEM server for the following purposes: Analyze the data from different log sources Correlate the events among the log entries Identify and prioritize significant events Initiate responses to events if required One of your log monitoring staff wants to know the features of SIEM product that will help them in these purposes. What features will you recommend? Each correct answer represents a complete solution.Choose all that apply.
- Adrian is the project manager of the NHP Project. In her project there are several work packages that deal with electrical wiring. Rather than to manage the risk internally she has decided to hire a vendor to complete all work packages that deal with the electrical wiring. By removing the risk internally to a licensed electrician Adrian feels more comfortable with project team being safe. What type of risk response has Adrian used in this example?
- Which of the following is a malicious exploit of a website, whereby unauthorized commands are transmitted from a user trusted by the website?