Which one of the following metrics specifies the amount of time that business continuity planners find acceptable for the restoration of service after a disaster?

A. MTD
B. RTO
C. RPO
D. MTO


Answer: B. RTO

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. The Schnorr signature scheme is based on discrete logarithms. 2. The main work for signature generation depends on the message and is done during the idle time of the processor. 3. Unlike RSA, DSS cannot be used for encryption or key exchange. 4. The global public key components of DSA are the same as for the Schnorr signature scheme. 5. The first part of the Schnorr digital signature scheme is the generation of a private/public key pair.

Computer Science & Information Technology

The ____ option will copy a PowerPoint presentation and linked files onto a CD or DVD.

A. Save as DVD B. Prepare CD or DVD C. Package for CD D. Package for Remote Users

Computer Science & Information Technology

When reports are built from parameter queries, running the report yields different results depending on the parameter value entered

Indicate whether the statement is true or false

Computer Science & Information Technology

The default envelope size in Word 2013 is:

A) A4. B) 8 × 5 C) Size 8. D) Size 10.

Computer Science & Information Technology