What characteristic is common to risk assessments and threat assessments?
Author: Anonymous
True or False? One method of handling malware is to remove i…
True or False? One method of handling malware is to remove it from the infected system.
Which key planning principle guides the development of a bus…
Which key planning principle guides the development of a business continuity plan (BCP)?
True or False? Criticality is usually documented in the busi…
True or False? Criticality is usually documented in the business impact analysis (BIA) but is repeated in the business continuity plan (BCP) for the sake of clarity.
True or False? An external vulnerability assessment is calle…
True or False? An external vulnerability assessment is called “external” because it is performed outside the perimeter of the organization.
The National Institute of Standards and Technology (NIST) pu…
The National Institute of Standards and Technology (NIST) publishes SP 800-53. This document describes a variety of IT security controls, such as access control, incident response, and configuration management. Controls are grouped into families. Which NIST control family helps an organization recover from failures and disasters?
What are critical resources?
What are critical resources?
What step of a business continuity plan (BCP) comes after pr…
What step of a business continuity plan (BCP) comes after providing training?
True or False? A business continuity plan (BCP) is part of a…
True or False? A business continuity plan (BCP) is part of a business impact analysis (BIA).
True or False? The following equation is used during a cost-…
True or False? The following equation is used during a cost-benefit analysis to determine projected benefits: Loss After Control – Loss Before Control