Deck 10: Planning for Contingencies

ملء الشاشة (f)
exit full mode
سؤال
Using standard digital forensics methodology,the first step is to analyze the EM data without risking modification or unauthorized access.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Training should be as specialized as possible; personnel who are responsible for one duty should not be trained on other duties to avoid confusion during a disaster.
سؤال
Which of the following is a possible indicator of an actual incident?

A) Unusual consumption of computing resources
B) Activities at unexpected times
C) Presence of hacker tools
D) Reported attacks
سؤال
Analert digest is a description of the incident or disaster that usually contains just enoughinformation so that each person knows what portion of the IR or DR plan to implement withoutslowing down the notification process.____________
سؤال
A(n)wrap-up review is a detailedexamination and discussion of the events that occurred duringan incident or disaster,from first detection to final recovery.____________
سؤال
Which is the first step in the contingency planning process among the options listed here?

A) Business continuity training
B) Disaster recovery planning
C) Business impact analysis
D) Incident response planning
سؤال
Aslow-onset disaster is a disaster that occurs over time and gradually degrade the capacity of anorganization to withstand their effects.____________
سؤال
Which of the following has the main goal of restoring normal modes of operation with minimal cost and disruption to normal business activities after an adverse event?

A) Risk management
B) Contingency planning
C) Business response
D) Disaster readiness
سؤال
Disaster classification is the process of examining an adverse event or incident and determiningwhether it constitutes an actual disaster.____________
سؤال
An item does not become evidence until it is formally admitted to evidence by a judge or other ruling official.
سؤال
In a warm site,all services and communications links are fully configured and the site can be fully functional within minutes.
سؤال
Which of the following is a mathematical tool that can be useful in assessing relative importance while resolving the issue of what business function is the most critical?

A) Weighted analysis
B) BIA questionnaire
C) Recovery time organizer
D) MTD comparison
سؤال
Which of the following is the process of examining a possible incident and determining whether it constitutes an actual incident?

A) Incident classification
B) Incident identification
C) Incident registration
D) Incident verification
سؤال
When performing simlation testing,normal operations of the business are not impacted.
سؤال
Patch and proceed is anorganizational CP philosophy that focuses on the defense ofinformation assets and preventing reoccurrence rather than the attacker's identification andprosecution.____________
سؤال
In the event of an incident or disaster,which planning element is used to guide off-site operations?

A) Project management
B) Business continuity
C) Disaster recovery
D) Incident response
سؤال
In most organizations,the COO is responsible for creating the IR plan.
سؤال
What is the final stage of the business impact analysis when using the NIST SP 800-34 approach?

A) Identify resource requirements
B) Identify business processes
C) Determine mission/business processes and recovery criticality
D) Identify recovery priorities for system resources
سؤال
At what point in the incident lifecycle is the IR plan initiated?

A) Before an incident takes place
B) Once the DRP is activated
C) When an incident is detectedthataffects it
D) Once the BCP is activated
سؤال
When an incident takes place,the disaster recovery (DR)planis invoked before the incident response (IR)plan.
سؤال
In which contingency plan testing strategy do individuals participate in a role-playing exercise inwhich the CP team is presented with a scenario of an actual incident or disaster and expected to react as if it had occurred?

A) Desk check
B) Simulation
C) Structured walk-through
D) Parallel testing
سؤال
Which of the following is the transfer of live transactions to an off-site facility?

A) Remote journaling
B) Electronic vaulting
C) Database shadowing
D) Timesharing
سؤال
In digital forensics,all investigations follow the same basic methodology.Which of the following should be performed first in a digital forensics investigation?

A) Report the findings to the proper authority
B) Acquire (seize) the evidence without alteration or damage
C) Identify relevant items of evidentiary value (EM)
D) Analyze the data without risking modification or unauthorized access
سؤال
Which of the following is an approachavailable to an organization as an overall philosophy for contingency planning reactions?

A) Protect and forget
B) after-action review
C) Transfer to local/state/federal law enforcement
D) Track, hack and prosecute
سؤال
The four components of contingency planning are the ____________________,the incident response plan,the disaster recovery plan,and the business continuity plan.
سؤال
In which contingency plan testing strategy do individuals follow each and every IR/DR/BC procedure,including the interruption of service,restoration of data from backups,and notification of appropriate individuals?

A) Desk check
B) Simulation
C) Structured walk-through
D) Full-interruption
سؤال
Which of the following is a responsibility of the crisis management team?

A) Restoring the data from backups
B) Evaluating monitoring capabilities
C) Keeping the public informed about the event and the actions being taken
D) Restoring the services and processes in use
سؤال
When a disaster renders the current business location unusable,which plan is put into action?

A) Business continuity
B) Crisis management
C) Incident response
D) Business impact analysis
سؤال
Which of the following is true about a hot site?

A) It is an empty room with standard heating, air conditioning, and electrical service.
B) It includes computing equipment and peripherals with servers but not client workstations.
C) It duplicates computing resources, peripherals, phone systems, applications, and workstations.
D) All communications services must be installed after the site is occupied.
سؤال
After an incident,but before returning to its normal duties,the CSIRT must do which of the following?

A) Create the incident damage assessment
B) Conduct an after-action review
C) Restore data from backups
D) Restore services and processes in use
سؤال
If operations at the primary site cannot be quickly restored,the ____________________ occurs concurrently with the DR plan,enabling the business to continue at an alternate site.
سؤال
Which of the following determines the scope of the breach of confidentiality,integrity,and availability of information and information assets?

A) Incident report
B) Incident damage assessment
C) Information loss assessment
D) Damage report
سؤال
In which type of site are no computer hardware or peripherals provided?

A) Cold site
B) Warm site
C) Timeshare
D) Hot site
سؤال
Which of the following is a part of the incident recovery process?

A) Identifying the vulnerabilities that allowed the incident to occur and spread
B) Determining the event's impact on normal business operations and, if necessary, making a disaster declaration
C) Supporting personnel and their loved ones during the crisis
D) Keeping the public informed about the event and the actions being taken to ensure the recovery of personnel and the enterprise
سؤال
Which type of document grants formal permission for an investigation to occur?

A) Affidavit
B) Search warrant
C) Evidentiary report
D) Forensic concurrence
سؤال
Which of the following is a definite indicator of an actual incident?

A) Unusual system crashes
B) Reported attack
C) Presence of new accounts
D) Use of dormant accounts
سؤال
Which of the following allows investigators to determine what happened by examining the results of an event-criminal,natural,intentional,or accidental?

A) Digital malfeasance
B) E-discovery
C) Forensics
D) Evidentiary procedures
سؤال
Which document must be changed when evidence changes hands or is stored?

A) Chain of custody
B) Search warrant
C) Affidavit
D) Evidentiary material
سؤال
Which of the following is usually conducted via leased lines or secure Internet connections whereby the receiving server archives the data as it is received?.

A) Database shadowing
B) Timesharing
C) Traditional backups
D) Electronic vaulting
سؤال
Which of the following is the best example of a rapid-onset disaster?

A) Flood
B) Pest infestation
C) Famine
D) Environmental degradation
سؤال
When undertaking the BIA,whatshouldthe organization consider?
سؤال
The ____________________ plan is a detailed set of processes and procedures that anticipate,detect,and mitigate the effects of an unexpected event that might compromise information resources and assets.
سؤال
A(n)____________________ occurs when an attack affects information resources and/or assets,causing actual damage or other disruptions.
سؤال
What teams are involved in contingency planning and contingency operations?
سؤال
List four of the eight key components of a typical IR policy.
سؤال
Describe the methodology an organization should follow in an investigation.
سؤال
Compare and contrast a hot site,a warm site,and a cold site.
سؤال
In ____________________ testing of contingency plans,the individuals follow each and every procedure,including the interruption of service,restoration of data from backups,and notification of appropriate individuals.
سؤال
When dealing with an incident,the incident response team must conduct a(n)____________________,which entails a detailed examination of the events that occurred from first detection to final recovery.
سؤال
Discuss three of the five strategies that can be used to test contingency strategies.
سؤال
The bulk batch-transfer of data to an off-site facility is known as ____________________.
سؤال
List the seven steps of the incident recovery process according to Donald Pipkin.
سؤال
There are six key elements that the CP team must build into the DR Plan.What are three of them?
سؤال
What are the major components of contingency planning?
سؤال
The first component of the analysis phase of a digital forensic investigation is ___________,which allows the investigator to quickly and easily search for a specific type of file.
سؤال
A(n)____________________ is an agency that provides,in the case of DR/BC planning,physical facilities for a fee.
سؤال
____________________ planning ensures that critical business functions can continue if a disaster occurs.
سؤال
What are the three roles performed by the crisis management team?
سؤال
Explain the difference between a business impact analysis and the risk management process.
سؤال
A(n)____________________ is a document containing contact information of the individuals to notify in the event of an actual incident.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/60
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Planning for Contingencies
1
Using standard digital forensics methodology,the first step is to analyze the EM data without risking modification or unauthorized access.
False
2
Training should be as specialized as possible; personnel who are responsible for one duty should not be trained on other duties to avoid confusion during a disaster.
False
3
Which of the following is a possible indicator of an actual incident?

A) Unusual consumption of computing resources
B) Activities at unexpected times
C) Presence of hacker tools
D) Reported attacks
A
4
Analert digest is a description of the incident or disaster that usually contains just enoughinformation so that each person knows what portion of the IR or DR plan to implement withoutslowing down the notification process.____________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
5
A(n)wrap-up review is a detailedexamination and discussion of the events that occurred duringan incident or disaster,from first detection to final recovery.____________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which is the first step in the contingency planning process among the options listed here?

A) Business continuity training
B) Disaster recovery planning
C) Business impact analysis
D) Incident response planning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
7
Aslow-onset disaster is a disaster that occurs over time and gradually degrade the capacity of anorganization to withstand their effects.____________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following has the main goal of restoring normal modes of operation with minimal cost and disruption to normal business activities after an adverse event?

A) Risk management
B) Contingency planning
C) Business response
D) Disaster readiness
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
9
Disaster classification is the process of examining an adverse event or incident and determiningwhether it constitutes an actual disaster.____________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
10
An item does not become evidence until it is formally admitted to evidence by a judge or other ruling official.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
11
In a warm site,all services and communications links are fully configured and the site can be fully functional within minutes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following is a mathematical tool that can be useful in assessing relative importance while resolving the issue of what business function is the most critical?

A) Weighted analysis
B) BIA questionnaire
C) Recovery time organizer
D) MTD comparison
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is the process of examining a possible incident and determining whether it constitutes an actual incident?

A) Incident classification
B) Incident identification
C) Incident registration
D) Incident verification
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
14
When performing simlation testing,normal operations of the business are not impacted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
15
Patch and proceed is anorganizational CP philosophy that focuses on the defense ofinformation assets and preventing reoccurrence rather than the attacker's identification andprosecution.____________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
16
In the event of an incident or disaster,which planning element is used to guide off-site operations?

A) Project management
B) Business continuity
C) Disaster recovery
D) Incident response
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
17
In most organizations,the COO is responsible for creating the IR plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
18
What is the final stage of the business impact analysis when using the NIST SP 800-34 approach?

A) Identify resource requirements
B) Identify business processes
C) Determine mission/business processes and recovery criticality
D) Identify recovery priorities for system resources
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
19
At what point in the incident lifecycle is the IR plan initiated?

A) Before an incident takes place
B) Once the DRP is activated
C) When an incident is detectedthataffects it
D) Once the BCP is activated
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
20
When an incident takes place,the disaster recovery (DR)planis invoked before the incident response (IR)plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
21
In which contingency plan testing strategy do individuals participate in a role-playing exercise inwhich the CP team is presented with a scenario of an actual incident or disaster and expected to react as if it had occurred?

A) Desk check
B) Simulation
C) Structured walk-through
D) Parallel testing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following is the transfer of live transactions to an off-site facility?

A) Remote journaling
B) Electronic vaulting
C) Database shadowing
D) Timesharing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
23
In digital forensics,all investigations follow the same basic methodology.Which of the following should be performed first in a digital forensics investigation?

A) Report the findings to the proper authority
B) Acquire (seize) the evidence without alteration or damage
C) Identify relevant items of evidentiary value (EM)
D) Analyze the data without risking modification or unauthorized access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following is an approachavailable to an organization as an overall philosophy for contingency planning reactions?

A) Protect and forget
B) after-action review
C) Transfer to local/state/federal law enforcement
D) Track, hack and prosecute
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
25
The four components of contingency planning are the ____________________,the incident response plan,the disaster recovery plan,and the business continuity plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
26
In which contingency plan testing strategy do individuals follow each and every IR/DR/BC procedure,including the interruption of service,restoration of data from backups,and notification of appropriate individuals?

A) Desk check
B) Simulation
C) Structured walk-through
D) Full-interruption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which of the following is a responsibility of the crisis management team?

A) Restoring the data from backups
B) Evaluating monitoring capabilities
C) Keeping the public informed about the event and the actions being taken
D) Restoring the services and processes in use
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
28
When a disaster renders the current business location unusable,which plan is put into action?

A) Business continuity
B) Crisis management
C) Incident response
D) Business impact analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which of the following is true about a hot site?

A) It is an empty room with standard heating, air conditioning, and electrical service.
B) It includes computing equipment and peripherals with servers but not client workstations.
C) It duplicates computing resources, peripherals, phone systems, applications, and workstations.
D) All communications services must be installed after the site is occupied.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
30
After an incident,but before returning to its normal duties,the CSIRT must do which of the following?

A) Create the incident damage assessment
B) Conduct an after-action review
C) Restore data from backups
D) Restore services and processes in use
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
31
If operations at the primary site cannot be quickly restored,the ____________________ occurs concurrently with the DR plan,enabling the business to continue at an alternate site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following determines the scope of the breach of confidentiality,integrity,and availability of information and information assets?

A) Incident report
B) Incident damage assessment
C) Information loss assessment
D) Damage report
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
33
In which type of site are no computer hardware or peripherals provided?

A) Cold site
B) Warm site
C) Timeshare
D) Hot site
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which of the following is a part of the incident recovery process?

A) Identifying the vulnerabilities that allowed the incident to occur and spread
B) Determining the event's impact on normal business operations and, if necessary, making a disaster declaration
C) Supporting personnel and their loved ones during the crisis
D) Keeping the public informed about the event and the actions being taken to ensure the recovery of personnel and the enterprise
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which type of document grants formal permission for an investigation to occur?

A) Affidavit
B) Search warrant
C) Evidentiary report
D) Forensic concurrence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following is a definite indicator of an actual incident?

A) Unusual system crashes
B) Reported attack
C) Presence of new accounts
D) Use of dormant accounts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following allows investigators to determine what happened by examining the results of an event-criminal,natural,intentional,or accidental?

A) Digital malfeasance
B) E-discovery
C) Forensics
D) Evidentiary procedures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which document must be changed when evidence changes hands or is stored?

A) Chain of custody
B) Search warrant
C) Affidavit
D) Evidentiary material
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which of the following is usually conducted via leased lines or secure Internet connections whereby the receiving server archives the data as it is received?.

A) Database shadowing
B) Timesharing
C) Traditional backups
D) Electronic vaulting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which of the following is the best example of a rapid-onset disaster?

A) Flood
B) Pest infestation
C) Famine
D) Environmental degradation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
41
When undertaking the BIA,whatshouldthe organization consider?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
42
The ____________________ plan is a detailed set of processes and procedures that anticipate,detect,and mitigate the effects of an unexpected event that might compromise information resources and assets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
43
A(n)____________________ occurs when an attack affects information resources and/or assets,causing actual damage or other disruptions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
44
What teams are involved in contingency planning and contingency operations?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
45
List four of the eight key components of a typical IR policy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
46
Describe the methodology an organization should follow in an investigation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
47
Compare and contrast a hot site,a warm site,and a cold site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
48
In ____________________ testing of contingency plans,the individuals follow each and every procedure,including the interruption of service,restoration of data from backups,and notification of appropriate individuals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
49
When dealing with an incident,the incident response team must conduct a(n)____________________,which entails a detailed examination of the events that occurred from first detection to final recovery.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
50
Discuss three of the five strategies that can be used to test contingency strategies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
51
The bulk batch-transfer of data to an off-site facility is known as ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
52
List the seven steps of the incident recovery process according to Donald Pipkin.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
53
There are six key elements that the CP team must build into the DR Plan.What are three of them?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
54
What are the major components of contingency planning?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
55
The first component of the analysis phase of a digital forensic investigation is ___________,which allows the investigator to quickly and easily search for a specific type of file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
56
A(n)____________________ is an agency that provides,in the case of DR/BC planning,physical facilities for a fee.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
57
____________________ planning ensures that critical business functions can continue if a disaster occurs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
58
What are the three roles performed by the crisis management team?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
59
Explain the difference between a business impact analysis and the risk management process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
60
A(n)____________________ is a document containing contact information of the individuals to notify in the event of an actual incident.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.