Question 1
Deciding the level of protection a particular asset should be given in BEST determined by:
Question 2
Which of the following defines the triggers within a business continuity plan (BCP)?
Question 3
When performing a business impact analysis (BIA), which of the following should calculate the recovery time and cost estimates?
Question 4
Which of the following would BEST protect an organization's confidential data stored on a laptop computer from unauthorized access?
Question 5
An IS manager has decided to implement a security system to monitor access to the Internet and prevent access to numerous sites. Immediately upon installation, employees Hood the IT helpdesk with complaints of being unable to perform business functions on Internet sites. This is an example of: