A(n) ____________ is a step-by-step description of the methods used to secure data against disaster and a set of guidelines for how an organization will recover lost data and resume operations if and when a disaster occurs.

Fill in the blank(s) with the appropriate word(s).


disaster recovery plan

Computer Science & Information Technology

You might also like to view...

When you run the scr1 script using the ./scr1 command, the filename is considered position zero in the command, and the text ./scr1 becomes the value of the ____ variable.

A. $0 B. $1 C. $run D. $command

Computer Science & Information Technology

As you begin your presentation, you should let the audience know your purpose and provide them with an overview of your presentation

Indicate whether the statement is true or false

Computer Science & Information Technology

You can use the ________ function to find values in a field that match a specific pattern

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following should a user enable if she wants to host a gaming server on a home network?

A) DMZ B) DHCP C) Port forwarding D) SSID broadcasting

Computer Science & Information Technology