OCTAVE, a highly flexible assessment strategy, can be tailored to nearly any organization and can be very effective in identifying ________

A) areas where the organization is most likely to be affected by a disaster recovery
B) areas where the organization is most likely to be affected by a disaster situation
C) areas where the organization is most likely to be affected by backup procedures
D) costs associated with disaster recovery


B

Computer Science & Information Technology

You might also like to view...

____ would be those risks that might not compromise critical information but where the losses would still have business impacts.

A. Critical risks B. Minor risks C. Avoidable risks D. Moderate risks

Computer Science & Information Technology

What type of malware is typically added to a legitimate program but lies dormant until it is triggered by a specific event?

A. logic bomb B. spam C. zombie D. ransomware

Computer Science & Information Technology

Digital images are called ____ graphics because they are created with pixels.

A. scan B. vector C. photo D. bitmap

Computer Science & Information Technology

A range is the small box formed by the intersection of a column and a row

Indicate whether the statement is true or false

Computer Science & Information Technology