If an incident can no longer be contained, causing significant damage or danger to the immediate infrastructure, it is covered under __________.
A. incident response
B. disaster recovery
C. business continuity
D. change management
Answer: B
Computer Science & Information Technology
You might also like to view...
Write a statement that opens file "oldmast.txt" for input—use Scanner variable in- OldMaster.
What will be an ideal response?
Computer Science & Information Technology
A(n) ________ allows you to compose, send and receive e-mail messages, while a mail server functions as the post office and ensures you can send and receive messages
Fill in the blank(s) with correct word
Computer Science & Information Technology
Flash stores and manages symbols on the Stage.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Database software stores data as a series of ____________, which are composed of fields that hold data.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology