What will likely result in some tier 2 and tier 3 systems moving from one tier to the other?

A) Dependency analysis B) Prioritizing disaster recovery
C) Identifying functions and processes D) Identifying critical assets


A

Computer Science & Information Technology

You might also like to view...

An electronic spreadsheet is often referred to as a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Describe open system authentication.

What will be an ideal response?

Computer Science & Information Technology

Case A-1Tayler Rae is the new web master for her sorority at Northern University. She is responsible for the content and design of its web pages. Tayler plans to incorporate many elements including text, images, sound, and movies. Tayler wants to add visual interest to the sorority's web pages by incorporating more images. However, if too many images are added, what effect can it have on viewers?

A. Pages may load too slowly. B. Viewers may not wait for the images to load and leave the website. C. Neither a nor b. Viewers like images and will wait for them to load. D. Both a and b.

Computer Science & Information Technology

________ is the assurance that the systems responsible for delivering, storing, and processing information are accessible when required by authorized users.

A. Integrity B. Confidentiality C. Availability D. Authenticity

Computer Science & Information Technology