____ is planning based on responding to scenarios; in the case of security, this is also known as "disaster planning."
A. Continuity planning
B. Contingency planning
C. Recovery planning
D. Emergency planning
Answer: B
Computer Science & Information Technology
You might also like to view...
Data types are characteristics that determine the type of data that may be entered in a field
Indicate whether the statement is true or false
Computer Science & Information Technology
Documentation is not a necessity.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
____ cookies are cookies placed on your hard drive by a company other than the one associated with the Web page that you are viewing-typically a Web advertising company.
A. Outsider B. Associate C. Tagged D. Third-party
Computer Science & Information Technology
How do you run a PL/SQL block?
What will be an ideal response?
Computer Science & Information Technology