Which of the following is a part of the incident recovery process?

A. identifying the vulnerabilities that allowed the incident to occur and spread
B. determining the event's impact on normal business operations and, if necessary, making a disaster declaration
C. supporting personnel and their loved ones during the crisis
D. keeping the public informed about the event and the actions being taken to ensure the recovery of personnel and the enterprise


Answer: A

Computer Science & Information Technology

You might also like to view...

In a traditional file data structure, __________ are combined to form __________ which are combined to form the ____________.

a. records/fields/file b. fields/files/record c. fields/records/file d. none of the above

Computer Science & Information Technology

A temporary storage area for text or graphics that you select and then cut or copy

What will be an ideal response?

Computer Science & Information Technology

The Institute of Electrical and Electronics Engineers (IEEE) has established worldwide networking protocols, including the Open Systems Interconnection (OSI) reference model.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

IP in the phrase IP address refers to _______________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology