True or False? Following an outage or disruption of services, the business continuity plan (BCP) serves as a road map for establishing business operations.
Blog
When an incident occurs, several options can be pursued. Whi…
When an incident occurs, several options can be pursued. Which of the following actions is recommended when assets of a low value are being attacked?
The __________ outlines the process by which the business co…
The __________ outlines the process by which the business continuity plan or the disaster recovery plan is activated.
True or False? A security expert, such as a chief informatio…
True or False? A security expert, such as a chief information security officer (CISO), would be a good security awareness trainer because of their depth of knowledge.
True or False? A charter is an organizational document that…
True or False? A charter is an organizational document that outlines the mission, goals, and authority of a team or committee.
True or False? Regarding incidents, a list of critical syste…
True or False? Regarding incidents, a list of critical systems, applications, and user access requirements is in the business impact analysis (BIA).
True or False? In the data classification scheme for recover…
True or False? In the data classification scheme for recovery of information, data that is designated as urgent is that which needs to be recovered as soon as possible to mitigate significant impact on the organization.
At Stanford University, data is labeled according to a class…
At Stanford University, data is labeled according to a classification scheme that identifies information in the following way: prohibited, restricted, confidential, and unrestricted. Which of the following schemes has Stanford adopted?
It is necessary to retain information for two significant re…
It is necessary to retain information for two significant reasons: legal obligation and business needs. Data that occupies the class of __________ is comprised of records that are required to support operations, such as customer and vendor records.
An organization implements a baseline of security systems. T…
An organization implements a baseline of security systems. This action causes a mission-critical application that had previously worked to suddenly fail. Which of the following solutions best addresses the problem although it requires time and patience?