Business Continuity Planning

Assignment Help Basic Computer Science
Reference no: EM132834837

1. Which of the following business continuity exercises can be quite involved and should be performed annually?

A. Disaster simulation testing

B. Table-top exercise

C. Structured walkthrough

2. Which plan is written to attempt to prevent a disaster from impacting the organization and/or to lessen a disaster's impact?

A. Disaster recovery plan

B. Business impact analysis

C. Business continuity plan

3. While developing the business continuity plan, your team must create a plan that ensures that normal operation can be resumed in a timely manner. Which element is your team creating?

A. Vulnerability analysis

B. Disaster recovery plan

C. Business continuity plan

4. Of the following choices, what is the best form of anti-malware protection?

A. Multiple solutions on each system

B. A single solution throughout the organization

C. Anti-malware protection at several locations

5. What is the first step of a business continuity plan (BCP)?

A. Business organization analysis

B. Select the BCP team

C. Resource requirements analysis

6. What task of BCP bridges the gap between the business impact assessment and the continuity planning phases?

A. Likelihood assessment

B. Provisions and processes

C. Strategy development task

7. Which business continuity plan element is primarily concerned with minimizing property damage and preventing loss of life?

A. Disaster recovery plan

B. Vulnerability analysis

C. Business impact analysis (BIA)

D. Risk analysis

8. You need to ensure that all systems, networks, and major applications can be recovered. What should you create or perform?

A. vulnerability analysis

B. contingency plan

C. risk analysis

D. business impact analysis (BIA)

9. Which of the following is likely to be the most significant challenge with developing an incident management plan?

A. Lack of management support

B. Intrusion by hackers

C. Security response procedures undertaken to detect brute force attacks

10. If a forensic copy of a hard drive is needed, the copy data are MOST defensible from a legal standpoint if which of the following is used?

A. An encrypted copy of all contents of a hard drive

B. A bit-by-bit copy of all data

C. A compressed copy of all contents of a hard drive

11. What is the capability to effectively manage unexpected events to the organization with the objective of minimizing impacts and maintaining and restoring normal operations?

A. Incident response

B. Incident management

C. Control objectives

12. What is the operational capability to identify, I prepare for and respond to incidents?

A. Risk tolerance

B. Quality assurance

C. Incident response

Reference no: EM132834837

Questions Cloud

Advanced computer architecture : Conduct research on the IEEE or ACM journal articles or conference proceedings, published within the last one-year period, about the pipelining concepts.
Network Security-Common Weakness Enumeration : Compare and contrast a minimum of 7 CWEs. Identify at least 3 tools that could be used to test web applications for vulnerabilities.
Electronic Document And Record Management-IT : Which of the following items is NOT the component of Open Government? Process of obscuring or removing sensitive information for release
Project management methodologies and tools : Distinguish project management methodologies and tools.
Business Continuity Planning : Which of the following business continuity exercises can be quite involved and should be performed annually?
What is collective bargaining : What is collective bargaining? What is involved in the collective bargaining process?
RSA -Caesar Cypher-Disaster Recovery Plan : Using the Web or other resources, write a brief paper about RSA, its history, its methodology, and where it is used.
Discuss appropriate access control methods for employees : Discuss appropriate access control methods for employees, contractors, vendors, and customers.
Implementation of database system : Discuss some of the constraints that must be overcome in order to build a successful implementation of a database system.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd