____ is planning based on responding to scenarios; in the case of security, this is also known as "disaster planning."

A. Continuity planning
B. Contingency planning
C. Recovery planning
D. Emergency planning


Answer: B

Computer Science & Information Technology

You might also like to view...

Data types are characteristics that determine the type of data that may be entered in a field

Indicate whether the statement is true or false

Computer Science & Information Technology

Documentation is not a necessity.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

____ cookies are cookies placed on your hard drive by a company other than the one associated with the Web page that you are viewing-typically a Web advertising company.

A. Outsider B. Associate C. Tagged D. Third-party

Computer Science & Information Technology

How do you run a PL/SQL block?

What will be an ideal response?

Computer Science & Information Technology