Deck 13: Business Continuity

ملء الشاشة (f)
exit full mode
سؤال
Most metadata about a file is generated and recorded automatically without the user's knowledge.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Duplicate image backups are considered a primary key to uncovering evidence because they create exact replicas of the crime scene.
سؤال
In a(n) ____ cluster, every server in the cluster performs useful work.

A) symmetric network
B) asymmetric network
C) symmetric server
D) symmetric network
سؤال
A ____ is a service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service.

A) service level agreement
B) recovery point objective
C) recovery time objective
D) service point agreement
سؤال
A(n) ____ is a device that maintains power to equipment in the event of an interruption in the primary electrical power source.

A) uninterruptible power supply
B) redundant power supply
C) uninterruptible system supply
D) replica power supply
سؤال
____ is a form of eavesdropping in which special equipment is used to pick up telecommunication signals or data within a computer device by monitoring the electromagnetic fields.

A) Newton phreaking
B) Van Eck phreaking
C) Van Zek hacking
D) EMF phreaking
سؤال
The ____ response team serves as first responders whenever digital evidence needs to be preserved.

A) incident
B) computer forensics
C) risk
D) emergency
سؤال
In a(n) ____ cluster, a standby server exists only to take over for another server in the event of its failure.

A) symmetric network
B) symmetric server
C) asymmetric network
D) asymmetric server
سؤال
____ uses technology to search for computer evidence of a crime, can attempt to retrieve information-even if it has been altered or erased-that can be used in the pursuit of the attacker or criminal.

A) Computer forensics
B) Penetration testing
C) Vulnerability testing
D) Risk management
سؤال
System availability is often expressed as a percentage of uptime in a year.
سؤال
A ____ typically begins by identifying threats through a risk assessment.

A) BRA
B) BAA
C) BPA
D) BIA
سؤال
A ____ is a metallic enclosure that prevents the entry or escape of an electromagnetic field.

A) bollard
B) mantrap
C) Faraday cage
D) Newton cage
سؤال
A ____ is a component or entity in a system which, if it no longer functions, will disable the entire system.

A) recovery site
B) recovery point
C) single point of failure
D) cascade point of failure
سؤال
____ is designed to ensure that an organization can continue to function in the event of a natural or man-made disaster.

A) Business continuity planning and testing
B) Disaster planning
C) Business management planning and testing
D) Enterprise disaster planning
سؤال
____ plans typically include procedures to address redundancy and fault tolerance as well as data backups.

A) Enterprise recovery
B) Disaster recovery
C) Business recovery
D) Emergency recovery
سؤال
A ____ has all of the equipment installed, but does not have active Internet or telecommunications facilities, and does not have current backups of data.

A) cold site
B) hot site
C) spare site
D) warm site
سؤال
____ data is the most difficult type of data to capture.

A) Volatile
B) Static
C) Non-volatile
D) Persistent
سؤال
According to the Federal Bureau of Investigation (FBI), almost ____ percent of crimes committed today leave behind digital evidence that can be retrieved through computer forensics.

A) 65
B) 75
C) 85
D) 95
سؤال
RAM slack can contain any information that has been created, viewed, modified, downloaded, or copied since the computer was last booted.
سؤال
A subset of business continuity planning and testing is disaster recovery, also known as IT recovery planning.
سؤال
____ pertains only to the last sector of a file.

A) Disk slack
B) RAM slack
C) ROM slack
D) Edge slack
سؤال
The ____ documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence.

A) chain of value
B) chain of use
C) chain of property
D) chain of custody
سؤال
Discuss the purpose and importance of the chain of custody.
سؤال
Generally, ____________________ focuses on restoring computing and technology resources to their former state.
سؤال
A(n) ____ backup is an evidence-grade backup because its accuracy meets evidence standards.

A) baseline
B) mirror image
C) logical image
D) thin image
سؤال
A ____ is a snapshot of the current state of the computer that contains all current settings and data.

A) system standard
B) system view
C) system image
D) system baseline
سؤال
Windows stores files on a hard drive in 512-byte blocks called ____________________.
سؤال
Multiple sectors are used to make up a ____.

A) cluster
B) track
C) slice
D) platter
سؤال
Describe what happens when the response team arrives and secures the crime scene.
سؤال
Describe the Windows page file and discuss why it can be important for evidence recovery.
سؤال
RAID 0 technology is based on ____________________.
سؤال
Explain how to best capture volatile data.
سؤال
____ could contain remnants of previously deleted files or data from the format pattern associated with disk storage space that has yet to be used by the computer.

A) RAM slack
B) Edge slack
C) Drive file slack
D) Sector slack
سؤال
What are the steps in damage control?
سؤال
What are the objectives of disaster exercises?
سؤال
____________________ is data about data.
سؤال
Identify two scenarios that could be used in a BIA.
سؤال
The air-handling space above drop ceilings (and sometimes even between the walls and under structural floors) used to circulate and otherwise handle air in a building are called ____________________.
سؤال
Describe the purpose of a disaster recovery plan.
سؤال
What is required upon completion of an evidence examination?
سؤال
What does Windows do if a file being saved is not long enough to fill up the last sector on the disk?
سؤال
Match between columns
The sudden flow of electric current between two objects
Business continuity
The sudden flow of electric current between two objects
MTTR
The sudden flow of electric current between two objects
Business continuity planning and testing
The sudden flow of electric current between two objects
Succession planning
The sudden flow of electric current between two objects
BIA
The sudden flow of electric current between two objects
Disaster recovery
The sudden flow of electric current between two objects
MTBF
The sudden flow of electric current between two objects
ESD
The sudden flow of electric current between two objects
Forensics
The ability of an organization to maintain its operations and services in the face of a disruptive event
Business continuity
The ability of an organization to maintain its operations and services in the face of a disruptive event
MTTR
The ability of an organization to maintain its operations and services in the face of a disruptive event
Business continuity planning and testing
The ability of an organization to maintain its operations and services in the face of a disruptive event
Succession planning
The ability of an organization to maintain its operations and services in the face of a disruptive event
BIA
The ability of an organization to maintain its operations and services in the face of a disruptive event
Disaster recovery
The ability of an organization to maintain its operations and services in the face of a disruptive event
MTBF
The ability of an organization to maintain its operations and services in the face of a disruptive event
ESD
The ability of an organization to maintain its operations and services in the face of a disruptive event
Forensics
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
Business continuity
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
MTTR
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
Business continuity planning and testing
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
Succession planning
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
BIA
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
Disaster recovery
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
MTBF
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
ESD
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
Forensics
The average time until a component fails, cannot be repaired, and must be replaced
Business continuity
The average time until a component fails, cannot be repaired, and must be replaced
MTTR
The average time until a component fails, cannot be repaired, and must be replaced
Business continuity planning and testing
The average time until a component fails, cannot be repaired, and must be replaced
Succession planning
The average time until a component fails, cannot be repaired, and must be replaced
BIA
The average time until a component fails, cannot be repaired, and must be replaced
Disaster recovery
The average time until a component fails, cannot be repaired, and must be replaced
MTBF
The average time until a component fails, cannot be repaired, and must be replaced
ESD
The average time until a component fails, cannot be repaired, and must be replaced
Forensics
Focuses on protecting and restoring the information technology functions and services that support the business
Business continuity
Focuses on protecting and restoring the information technology functions and services that support the business
MTTR
Focuses on protecting and restoring the information technology functions and services that support the business
Business continuity planning and testing
Focuses on protecting and restoring the information technology functions and services that support the business
Succession planning
Focuses on protecting and restoring the information technology functions and services that support the business
BIA
Focuses on protecting and restoring the information technology functions and services that support the business
Disaster recovery
Focuses on protecting and restoring the information technology functions and services that support the business
MTBF
Focuses on protecting and restoring the information technology functions and services that support the business
ESD
Focuses on protecting and restoring the information technology functions and services that support the business
Forensics
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
Business continuity
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
MTTR
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
Business continuity planning and testing
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
Succession planning
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
BIA
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
Disaster recovery
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
MTBF
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
ESD
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
Forensics
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
Business continuity
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
MTTR
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
Business continuity planning and testing
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
Succession planning
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
BIA
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
Disaster recovery
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
MTBF
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
ESD
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
Forensics
The application of science to questions that are of interest to the legal profession
Business continuity
The application of science to questions that are of interest to the legal profession
MTTR
The application of science to questions that are of interest to the legal profession
Business continuity planning and testing
The application of science to questions that are of interest to the legal profession
Succession planning
The application of science to questions that are of interest to the legal profession
BIA
The application of science to questions that are of interest to the legal profession
Disaster recovery
The application of science to questions that are of interest to the legal profession
MTBF
The application of science to questions that are of interest to the legal profession
ESD
The application of science to questions that are of interest to the legal profession
Forensics
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 13: Business Continuity
1
Most metadata about a file is generated and recorded automatically without the user's knowledge.
True
2
Duplicate image backups are considered a primary key to uncovering evidence because they create exact replicas of the crime scene.
False
3
In a(n) ____ cluster, every server in the cluster performs useful work.

A) symmetric network
B) asymmetric network
C) symmetric server
D) symmetric network
C
4
A ____ is a service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service.

A) service level agreement
B) recovery point objective
C) recovery time objective
D) service point agreement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
A(n) ____ is a device that maintains power to equipment in the event of an interruption in the primary electrical power source.

A) uninterruptible power supply
B) redundant power supply
C) uninterruptible system supply
D) replica power supply
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
____ is a form of eavesdropping in which special equipment is used to pick up telecommunication signals or data within a computer device by monitoring the electromagnetic fields.

A) Newton phreaking
B) Van Eck phreaking
C) Van Zek hacking
D) EMF phreaking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
The ____ response team serves as first responders whenever digital evidence needs to be preserved.

A) incident
B) computer forensics
C) risk
D) emergency
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
In a(n) ____ cluster, a standby server exists only to take over for another server in the event of its failure.

A) symmetric network
B) symmetric server
C) asymmetric network
D) asymmetric server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
____ uses technology to search for computer evidence of a crime, can attempt to retrieve information-even if it has been altered or erased-that can be used in the pursuit of the attacker or criminal.

A) Computer forensics
B) Penetration testing
C) Vulnerability testing
D) Risk management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
System availability is often expressed as a percentage of uptime in a year.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
A ____ typically begins by identifying threats through a risk assessment.

A) BRA
B) BAA
C) BPA
D) BIA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
A ____ is a metallic enclosure that prevents the entry or escape of an electromagnetic field.

A) bollard
B) mantrap
C) Faraday cage
D) Newton cage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
A ____ is a component or entity in a system which, if it no longer functions, will disable the entire system.

A) recovery site
B) recovery point
C) single point of failure
D) cascade point of failure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
____ is designed to ensure that an organization can continue to function in the event of a natural or man-made disaster.

A) Business continuity planning and testing
B) Disaster planning
C) Business management planning and testing
D) Enterprise disaster planning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
____ plans typically include procedures to address redundancy and fault tolerance as well as data backups.

A) Enterprise recovery
B) Disaster recovery
C) Business recovery
D) Emergency recovery
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
A ____ has all of the equipment installed, but does not have active Internet or telecommunications facilities, and does not have current backups of data.

A) cold site
B) hot site
C) spare site
D) warm site
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
____ data is the most difficult type of data to capture.

A) Volatile
B) Static
C) Non-volatile
D) Persistent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
According to the Federal Bureau of Investigation (FBI), almost ____ percent of crimes committed today leave behind digital evidence that can be retrieved through computer forensics.

A) 65
B) 75
C) 85
D) 95
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
RAM slack can contain any information that has been created, viewed, modified, downloaded, or copied since the computer was last booted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
A subset of business continuity planning and testing is disaster recovery, also known as IT recovery planning.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
____ pertains only to the last sector of a file.

A) Disk slack
B) RAM slack
C) ROM slack
D) Edge slack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
The ____ documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence.

A) chain of value
B) chain of use
C) chain of property
D) chain of custody
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
Discuss the purpose and importance of the chain of custody.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
Generally, ____________________ focuses on restoring computing and technology resources to their former state.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
A(n) ____ backup is an evidence-grade backup because its accuracy meets evidence standards.

A) baseline
B) mirror image
C) logical image
D) thin image
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
A ____ is a snapshot of the current state of the computer that contains all current settings and data.

A) system standard
B) system view
C) system image
D) system baseline
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
Windows stores files on a hard drive in 512-byte blocks called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
Multiple sectors are used to make up a ____.

A) cluster
B) track
C) slice
D) platter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
Describe what happens when the response team arrives and secures the crime scene.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
Describe the Windows page file and discuss why it can be important for evidence recovery.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
RAID 0 technology is based on ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
Explain how to best capture volatile data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
____ could contain remnants of previously deleted files or data from the format pattern associated with disk storage space that has yet to be used by the computer.

A) RAM slack
B) Edge slack
C) Drive file slack
D) Sector slack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
What are the steps in damage control?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
What are the objectives of disaster exercises?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
____________________ is data about data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
Identify two scenarios that could be used in a BIA.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
The air-handling space above drop ceilings (and sometimes even between the walls and under structural floors) used to circulate and otherwise handle air in a building are called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
Describe the purpose of a disaster recovery plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
What is required upon completion of an evidence examination?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
What does Windows do if a file being saved is not long enough to fill up the last sector on the disk?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
The sudden flow of electric current between two objects
Business continuity
The sudden flow of electric current between two objects
MTTR
The sudden flow of electric current between two objects
Business continuity planning and testing
The sudden flow of electric current between two objects
Succession planning
The sudden flow of electric current between two objects
BIA
The sudden flow of electric current between two objects
Disaster recovery
The sudden flow of electric current between two objects
MTBF
The sudden flow of electric current between two objects
ESD
The sudden flow of electric current between two objects
Forensics
The ability of an organization to maintain its operations and services in the face of a disruptive event
Business continuity
The ability of an organization to maintain its operations and services in the face of a disruptive event
MTTR
The ability of an organization to maintain its operations and services in the face of a disruptive event
Business continuity planning and testing
The ability of an organization to maintain its operations and services in the face of a disruptive event
Succession planning
The ability of an organization to maintain its operations and services in the face of a disruptive event
BIA
The ability of an organization to maintain its operations and services in the face of a disruptive event
Disaster recovery
The ability of an organization to maintain its operations and services in the face of a disruptive event
MTBF
The ability of an organization to maintain its operations and services in the face of a disruptive event
ESD
The ability of an organization to maintain its operations and services in the face of a disruptive event
Forensics
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
Business continuity
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
MTTR
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
Business continuity planning and testing
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
Succession planning
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
BIA
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
Disaster recovery
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
MTBF
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
ESD
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
Forensics
The average time until a component fails, cannot be repaired, and must be replaced
Business continuity
The average time until a component fails, cannot be repaired, and must be replaced
MTTR
The average time until a component fails, cannot be repaired, and must be replaced
Business continuity planning and testing
The average time until a component fails, cannot be repaired, and must be replaced
Succession planning
The average time until a component fails, cannot be repaired, and must be replaced
BIA
The average time until a component fails, cannot be repaired, and must be replaced
Disaster recovery
The average time until a component fails, cannot be repaired, and must be replaced
MTBF
The average time until a component fails, cannot be repaired, and must be replaced
ESD
The average time until a component fails, cannot be repaired, and must be replaced
Forensics
Focuses on protecting and restoring the information technology functions and services that support the business
Business continuity
Focuses on protecting and restoring the information technology functions and services that support the business
MTTR
Focuses on protecting and restoring the information technology functions and services that support the business
Business continuity planning and testing
Focuses on protecting and restoring the information technology functions and services that support the business
Succession planning
Focuses on protecting and restoring the information technology functions and services that support the business
BIA
Focuses on protecting and restoring the information technology functions and services that support the business
Disaster recovery
Focuses on protecting and restoring the information technology functions and services that support the business
MTBF
Focuses on protecting and restoring the information technology functions and services that support the business
ESD
Focuses on protecting and restoring the information technology functions and services that support the business
Forensics
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
Business continuity
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
MTTR
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
Business continuity planning and testing
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
Succession planning
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
BIA
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
Disaster recovery
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
MTBF
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
ESD
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
Forensics
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
Business continuity
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
MTTR
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
Business continuity planning and testing
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
Succession planning
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
BIA
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
Disaster recovery
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
MTBF
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
ESD
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
Forensics
The application of science to questions that are of interest to the legal profession
Business continuity
The application of science to questions that are of interest to the legal profession
MTTR
The application of science to questions that are of interest to the legal profession
Business continuity planning and testing
The application of science to questions that are of interest to the legal profession
Succession planning
The application of science to questions that are of interest to the legal profession
BIA
The application of science to questions that are of interest to the legal profession
Disaster recovery
The application of science to questions that are of interest to the legal profession
MTBF
The application of science to questions that are of interest to the legal profession
ESD
The application of science to questions that are of interest to the legal profession
Forensics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.