Which of the following statements best describes trusted recovery controls?

A. Used to track and approve changes to a system
B. Ensures security is not breached when a computer system crashes
C. Preserves the state of the system before the crash and prevent further damage
D. Used to clearly mark and handle assets


Answer: B
Explanation: Trusted recovery controls ensure security is not breached when a computer system crashes.

Computer Science & Information Technology

You might also like to view...

All methods require at least one argument.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Case-Based Critical Thinking Questions ? Case 3-2 In PowerPoint 2016, Bella is learning how to merge shapes. She has merged one shape with the help of a co-worker, and is now ready to try it on her own. To merge shapes, Bella knows that she must first select _____.

A. 1 or more shapes B. 2 or more shapes C. 3 or more shapes D. 4 or more shapes

Computer Science & Information Technology

Since the days when storage devices were first made available to the public, they have now become _____.

a. more expensive and have greater capacity b. more affordable and have smaller capacity c. physically smaller with greater storage capacity d. physically larger and faster

Computer Science & Information Technology

Zero-day attacks might be stopped by ________ detection.

signature anamoly both anomaly and signature  active

Computer Science & Information Technology