Answer the following statement(s) true (T) or false (F)
1.Information technology-related initiatives are simple and straightforward.
2.The information technology infrastructure library (ITIL) is used to standardize, integrate, and manage information technology (IT) service delivery.
3.A business continuity plan is to be implemented after the occurrence of an interruption in a service.
4.The International Standards Organizational standard ISO 22301:2012 is applicable onlyto nonprofit organizations.
5.The disaster recovery plan must be testedin advance to ensure that it is effective and that people can execute it.
1.False
Information technology (IT)-related initiatives are seldom simple and straightforward. They are influenced by many factors: the vision, mission, and values of the organization; community and organizational ethics and values; a myriad of laws, regulations, and policies; industry guidelines and practices; changing business needs; and the values of the IT stakeholders and company owners.
2.True
The IT Infrastructure Library (ITIL) is a set of guidelines initially formulated by the U.K. government in the late 1980s and widely used today to standardize, integrate, and manage IT service delivery. ITIL provides a proven and practical framework to plan and deliver IT operational services based on a synthesis of the best ideas from international practitioners.
3.False
Having a business continuity plan in place before a business interruption occurs is critical; otherwise, an organization may not be able to respond quickly enough to prevent service interruption.
4.False
The International Standards Organizational standard ISO 22301:2012 (“Societal Security–Business Continuity Management Systems–Requirements”) specifies requirements to plan, establish, implement, operate, monitor, review, maintain, and continually improve a documented management system to prepare for, respond to, and recover from disruptive events when they arise. The standard is applicable to organizations in all industries, profit and nonprofit, and of all sizes.
5.True
The disaster recovery plan must be tested to ensure that it is effective and that people can execute it. Many companies practice the disaster recovery plan for at least one AAA priority system once per year.
You might also like to view...
Which of the following Trojan horse actions would allow an attacker to gain access to the victim’s system?
A) Erase files on a computer. B) Launch a DDoS attack. C) Spread other malware. D) Install a backdoor on a computer.
The built-in help gives you options for searching by ____________________.
Fill in the blank(s) with the appropriate word(s).
________ computers are also referred to as ultra portable or pocket computers
Fill in the blank(s) with correct word
Not only do you need to make plans for you upstream partners, you also need to take into account your downstream relationships, which are your ________
Fill in the blank(s) with correct word