Business Continuity Planning

Assignment Help Basic Computer Science
Reference no: EM132834837

1. Which of the following business continuity exercises can be quite involved and should be performed annually?

A. Disaster simulation testing

B. Table-top exercise

C. Structured walkthrough

2. Which plan is written to attempt to prevent a disaster from impacting the organization and/or to lessen a disaster's impact?

A. Disaster recovery plan

B. Business impact analysis

C. Business continuity plan

3. While developing the business continuity plan, your team must create a plan that ensures that normal operation can be resumed in a timely manner. Which element is your team creating?

A. Vulnerability analysis

B. Disaster recovery plan

C. Business continuity plan

4. Of the following choices, what is the best form of anti-malware protection?

A. Multiple solutions on each system

B. A single solution throughout the organization

C. Anti-malware protection at several locations

5. What is the first step of a business continuity plan (BCP)?

A. Business organization analysis

B. Select the BCP team

C. Resource requirements analysis

6. What task of BCP bridges the gap between the business impact assessment and the continuity planning phases?

A. Likelihood assessment

B. Provisions and processes

C. Strategy development task

7. Which business continuity plan element is primarily concerned with minimizing property damage and preventing loss of life?

A. Disaster recovery plan

B. Vulnerability analysis

C. Business impact analysis (BIA)

D. Risk analysis

8. You need to ensure that all systems, networks, and major applications can be recovered. What should you create or perform?

A. vulnerability analysis

B. contingency plan

C. risk analysis

D. business impact analysis (BIA)

9. Which of the following is likely to be the most significant challenge with developing an incident management plan?

A. Lack of management support

B. Intrusion by hackers

C. Security response procedures undertaken to detect brute force attacks

10. If a forensic copy of a hard drive is needed, the copy data are MOST defensible from a legal standpoint if which of the following is used?

A. An encrypted copy of all contents of a hard drive

B. A bit-by-bit copy of all data

C. A compressed copy of all contents of a hard drive

11. What is the capability to effectively manage unexpected events to the organization with the objective of minimizing impacts and maintaining and restoring normal operations?

A. Incident response

B. Incident management

C. Control objectives

12. What is the operational capability to identify, I prepare for and respond to incidents?

A. Risk tolerance

B. Quality assurance

C. Incident response

Reference no: EM132834837

Questions Cloud

Advanced computer architecture : Conduct research on the IEEE or ACM journal articles or conference proceedings, published within the last one-year period, about the pipelining concepts.
Network Security-Common Weakness Enumeration : Compare and contrast a minimum of 7 CWEs. Identify at least 3 tools that could be used to test web applications for vulnerabilities.
Electronic Document And Record Management-IT : Which of the following items is NOT the component of Open Government? Process of obscuring or removing sensitive information for release
Project management methodologies and tools : Distinguish project management methodologies and tools.
Business Continuity Planning : Which of the following business continuity exercises can be quite involved and should be performed annually?
What is collective bargaining : What is collective bargaining? What is involved in the collective bargaining process?
RSA -Caesar Cypher-Disaster Recovery Plan : Using the Web or other resources, write a brief paper about RSA, its history, its methodology, and where it is used.
Discuss appropriate access control methods for employees : Discuss appropriate access control methods for employees, contractors, vendors, and customers.
Implementation of database system : Discuss some of the constraints that must be overcome in order to build a successful implementation of a database system.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Determine the quantity of mortar needed for the wall

Determine the quantity of mortar needed for the wall in Problem if 7.5 cubic feet of mortar is required per 100 square feet of brick.

  Project managers and ethics-leadership and technology

Describe the different organizational structures as it relates to project management (i.e., functional, project-based, matrix). Discuss at least two (two) different roles that project managers can play in organizational leadership.

  Role of nist in cybersecurity under fisma

The role of NIST in Cybersecurity under FISMA.

  Write a non-recursive function vowels

Write a non-recursive function vowels() that accepts a character string and counts and returns the number of vowels (aeiou) in the string.

  The erm approach in higher education environments

In chapter 9, the reading covers the ERM approach in Higher Education (HE) environments.

  What is the size of one second of filming

You are a movie producer. You have ordered film to be shot at a resoluton of 2002 x 3000 at 64 bit color. Your frames will be shot at 25 frames per second and the movie will be 1 minute long

  Identify an ict-related ethical issue from a media article

identify an ICT-related ethical issue from a media article or case study;

  Develop a new centralized system

A text message to customers who are overdue for more than 3 days is generated every day. The current system is run on old standalone PCs that are not connected in a central system. The owner of the company requested a software expert to develop a ..

  Performance standards specified in agreement

Discuss what should happen when a provider doesn't meet agreed upon service levels or has missed the minimum performance standards specified in the agreement.

  What are some business strategies businesses may use

What are some business strategies businesses may use? What are some implications of these strategies to your business or one with which you are familiar?

  The long-standing mubarak regime in egypt

It would have been hard to miss the information had you been scanning the newspapers during the tumultuous February of 2011, when the long-standing Mubarak regime in Egypt was swept from power by a popular uprising ultimately aligned with the militar..

  How erm adoption and implementation in higher education

Explain how ERM adoption and implementation in the higher education (HE) environment differs from the for-profit environment

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd