The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient, is known as:
A. business continuity planning
B. disaster planning
C. business management planning
D. enterprise disaster planning
Answer: A
You might also like to view...
A bullet symbol CANNOT be customized
Indicate whether the statement is true or false
____ ensures that the network does not become saturated at any one point.?
A. ?End-to-end er ror control B. ?Congestion control C. ?End-to-end flow control D. ?Synchronization points control
A(n) ________ is a document that defines all of the known resources, actions, tasks, systems, and data that are required to manage a business recovery process in the event of a significant business interruption
Fill in the blank(s) with correct word
What virtualization technology makes it possible to avoid overhead associated with software-managed shadow page tables?
A. Time Sliced Prioritization Method (TSPM) B. Second Level Address Translation (SLAT) C. Threaded Input / Output Translation (TIOT) D. Virtual Disk Interface Layer (VDIL)