The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient, is known as:

A. business continuity planning
B. disaster planning
C. business management planning
D. enterprise disaster planning


Answer: A

Computer Science & Information Technology

You might also like to view...

A bullet symbol CANNOT be customized

Indicate whether the statement is true or false

Computer Science & Information Technology

____ ensures that the network does not become saturated at any one point.?

A. ?End-to-end er ror control B. ?Congestion control C. ?End-to-end flow control D. ?Synchronization points control

Computer Science & Information Technology

A(n) ________ is a document that defines all of the known resources, actions, tasks, systems, and data that are required to manage a business recovery process in the event of a significant business interruption

Fill in the blank(s) with correct word

Computer Science & Information Technology

What virtualization technology makes it possible to avoid overhead associated with software-managed shadow page tables?

A. Time Sliced Prioritization Method (TSPM) B. Second Level Address Translation (SLAT) C. Threaded Input / Output Translation (TIOT) D. Virtual Disk Interface Layer (VDIL)

Computer Science & Information Technology