Which sub-team of the disaster recovery team will provide information on exactly which systems are on the critical path?

A) Administrative Support Team B) Damage Assessment Team
C) Departmental Recovery Team D) Business Recovery Team


D

Computer Science & Information Technology

You might also like to view...

The ____ mailing list is a widely known, major source of public vulnerability announcements.

A. NetStumbler B. Wireshark C. Bugtraq D. OVAL

Computer Science & Information Technology

Using a copy of your friend's software is unethical and illegal

Indicate whether the statement is true or false

Computer Science & Information Technology

The ________ Web App gives every member of the team the option to review notes and specifications written by other team members

Fill in the blank(s) with correct word

Computer Science & Information Technology

What is the maximum number of simultaneous users that can access a Windows 7 share?

A) 20 B) 45 C) 60 D) 8 E) 10

Computer Science & Information Technology