Save
Terms in this set (69)
Which of the following Business impact analysis
determines the impact to
an organization in the event
that key processes and
technology are not
available?
Which of the following Business continuity plan
clearly defines
responsibilities and support
structures (e.g., facilities,
personnel, equipment,
software, data files, vital
records, etc.) to carry on
the business after an event?
Which of the following Business impact analysis
identifies what assets are
required for the business to
recover from an event and
continue doing business?
Which of the following Risk assessment
involves a review of
controls that could mitigate
each risk and weighs the
cost, both in terms of time
and money, of
implementing those
controls against the
likelihood of the risk itself?
, Which of the following Risk analysis
determines the probability
of a risk (such as an
earthquake or a power
outage) to occur and the
impact that occurrence
would have on operations?
Which of the following Disaster Recovery Plan
documents specific
procedures to return a
given system or subsystem
to production in the event
of failure or compromise?
Which of the following is NFS
used to make remote
folders appear as part of
the local file system on
Linux and even Windows
systems?
Adam's company recently Incident
suffered an attack where
hackers exploited an SQL
injection issue on their web
server and stole sensitive
information from a
database. What term
describes this activity?
Joe is responsible for the Supervisory Control and Data Acquisition (SCADA)
security of the industrial
control systems for a power
plant. What type of
environment does Joe
administer?