For disaster recovery purposes, what criteria are used to identify an application or data as critical?

What will be an ideal response?


Critical application and files are those that impact the short-run survival of the firm. Critical items impact cash flows, legal obligations, and customer relations.

PTS: 1

Computer Science & Information Technology

You might also like to view...

When an entire message is encrypted for confidentiality using either symmetric or asymmetric encryption the security of the scheme generally depends on the __________ of the key.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The primary focus of ____ is to determine if the standards and/or regulations the organization claims to comply with are, in fact, complied with.

A. accreditation B. configuration management C. continuous monitoring D. an audit

Computer Science & Information Technology

Analyze the following code and choose the best answer:

``` public class Foo { private int x; public static void main(String[] args) { Foo foo = new Foo(); System.out.println(foo.x); } } ``` a. Since x is private, it cannot be accessed from an object foo. b. Since x is defined in the class Foo, it can be accessed by any method inside the class without using an object. You can write the code to access x without creating an object such as foo in this code. c. Since x is an instance variable, it cannot be directly used inside a main method. However, it can be accessed through an object such as foo in this code. d. You cannot create a self-referenced object; that is, foo is created inside the class Foo.

Computer Science & Information Technology

A cable lock is

A) A physical security measure using the universal security slot B) A lock attached internally that contacts and tracks the laptop C) A special connector used to lock the RJ-45 cable into the laptop D) A lock found on a notebook motherboard to track the computer

Computer Science & Information Technology