Question 16
When developing a disaster recovery plan, which of the following would be MOST helpful in prioritizing the order in which systems should be recovered?
Question 17
An organization's marketing department has requested access to cloud-based collaboration sites for exchanging media files with external marketing companies. As a result, the information security manager has been asked to perform a risk assessment. Which of the following should be the MOST important consideration?
Question 18
What is the MAIN drawback of e-mailing password-protected zip files across the Internet? They:
Question 19
Which of the following provides the BKST confirmation that the business continuity/disaster recovery plan objectives have been achieved?
Question 20
Information security can BEST be enforced by making security: