What specific way can disaster recovery plans be tested?

A. alternative processing
B. restoration simulation
C. tabletop exercises
D. alternative exercises


Answer: C

Computer Science & Information Technology

You might also like to view...

Examples of something the individual possesses would include cryptographic keys, electronic keycards, smart cards, and physical keys. This type of authenticator is referred to as a __________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Match each of the following extensions to its file type:

I. .jpg II. .mp3 III. .docx IV. .xlsx V. .mov A. audio file B. Excel workbook C. Word document D. image file E. video file

Computer Science & Information Technology

Where would you go to set up validation fields?

A) A table's Field Rules pane B) A table's Field Properties pane C) A table's Data Entry Rules pane D) A table's Text Properties pane

Computer Science & Information Technology

A(n) ________ lists words that have the same or similar meaning to the word being looked up

A) atlas B) thesaurus C) almanac D) dictionary

Computer Science & Information Technology