The threat evaluation process performed when designing a business continuity plan (BCP) or disaster recovery plan (DRP) evaluates risk in light of work process and is similar in nature to the technique used when designing security policies. What is this threat evaluation process called?

A Business impact analysis
B Quantitative analysis
C Qualitative analysis
D Threat modeling


Answer: A Business impact analysis

Computer Science & Information Technology

You might also like to view...

Suppose a memory manager has chosen a modified page for replacement. This page must be sent to secondary storage before the new page may be placed in its page frame. Therefore, the memory manager requests an I/O operation to write this page to secondary storage.An entry is made in a list of I/O requests waiting to be serviced. Thus the page will remain in main memory for some time before the requested I/O operation is performed. Now suppose that, while the other I/O requests are serviced, a running process requests the page to be replaced.How should the memory manager react?

What will be an ideal response?

Computer Science & Information Technology

The Debug button will return you to the MS VBA Editor window, and the line of code that contains the error will be highlighted in which of the following colors?

A) Yellow B) Orange C) Red D) Blue

Computer Science & Information Technology

The Salesforce Service Cloud, seen in the accompanying figure, is a business application that runs in the Cloud.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following numeric data types is used for smaller, less precise floating-point numbers?

A. Double B. Float C. Short D. Byte

Computer Science & Information Technology