Deck 13: Business Continuity

Full screen (f)
exit full mode
Question
Most metadata about a file is generated and recorded automatically without the user's knowledge.
Use Space or
up arrow
down arrow
to flip the card.
Question
Duplicate image backups are considered a primary key to uncovering evidence because they create exact replicas of the crime scene.
Question
In a(n) ____ cluster, every server in the cluster performs useful work.

A) symmetric network
B) asymmetric network
C) symmetric server
D) symmetric network
Question
A ____ is a service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service.

A) service level agreement
B) recovery point objective
C) recovery time objective
D) service point agreement
Question
A(n) ____ is a device that maintains power to equipment in the event of an interruption in the primary electrical power source.

A) uninterruptible power supply
B) redundant power supply
C) uninterruptible system supply
D) replica power supply
Question
____ is a form of eavesdropping in which special equipment is used to pick up telecommunication signals or data within a computer device by monitoring the electromagnetic fields.

A) Newton phreaking
B) Van Eck phreaking
C) Van Zek hacking
D) EMF phreaking
Question
The ____ response team serves as first responders whenever digital evidence needs to be preserved.

A) incident
B) computer forensics
C) risk
D) emergency
Question
In a(n) ____ cluster, a standby server exists only to take over for another server in the event of its failure.

A) symmetric network
B) symmetric server
C) asymmetric network
D) asymmetric server
Question
____ uses technology to search for computer evidence of a crime, can attempt to retrieve information-even if it has been altered or erased-that can be used in the pursuit of the attacker or criminal.

A) Computer forensics
B) Penetration testing
C) Vulnerability testing
D) Risk management
Question
System availability is often expressed as a percentage of uptime in a year.
Question
A ____ typically begins by identifying threats through a risk assessment.

A) BRA
B) BAA
C) BPA
D) BIA
Question
A ____ is a metallic enclosure that prevents the entry or escape of an electromagnetic field.

A) bollard
B) mantrap
C) Faraday cage
D) Newton cage
Question
A ____ is a component or entity in a system which, if it no longer functions, will disable the entire system.

A) recovery site
B) recovery point
C) single point of failure
D) cascade point of failure
Question
____ is designed to ensure that an organization can continue to function in the event of a natural or man-made disaster.

A) Business continuity planning and testing
B) Disaster planning
C) Business management planning and testing
D) Enterprise disaster planning
Question
____ plans typically include procedures to address redundancy and fault tolerance as well as data backups.

A) Enterprise recovery
B) Disaster recovery
C) Business recovery
D) Emergency recovery
Question
A ____ has all of the equipment installed, but does not have active Internet or telecommunications facilities, and does not have current backups of data.

A) cold site
B) hot site
C) spare site
D) warm site
Question
____ data is the most difficult type of data to capture.

A) Volatile
B) Static
C) Non-volatile
D) Persistent
Question
According to the Federal Bureau of Investigation (FBI), almost ____ percent of crimes committed today leave behind digital evidence that can be retrieved through computer forensics.

A) 65
B) 75
C) 85
D) 95
Question
RAM slack can contain any information that has been created, viewed, modified, downloaded, or copied since the computer was last booted.
Question
A subset of business continuity planning and testing is disaster recovery, also known as IT recovery planning.
Question
____ pertains only to the last sector of a file.

A) Disk slack
B) RAM slack
C) ROM slack
D) Edge slack
Question
The ____ documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence.

A) chain of value
B) chain of use
C) chain of property
D) chain of custody
Question
Discuss the purpose and importance of the chain of custody.
Question
Generally, ____________________ focuses on restoring computing and technology resources to their former state.
Question
A(n) ____ backup is an evidence-grade backup because its accuracy meets evidence standards.

A) baseline
B) mirror image
C) logical image
D) thin image
Question
A ____ is a snapshot of the current state of the computer that contains all current settings and data.

A) system standard
B) system view
C) system image
D) system baseline
Question
Windows stores files on a hard drive in 512-byte blocks called ____________________.
Question
Multiple sectors are used to make up a ____.

A) cluster
B) track
C) slice
D) platter
Question
Describe what happens when the response team arrives and secures the crime scene.
Question
Describe the Windows page file and discuss why it can be important for evidence recovery.
Question
RAID 0 technology is based on ____________________.
Question
Explain how to best capture volatile data.
Question
____ could contain remnants of previously deleted files or data from the format pattern associated with disk storage space that has yet to be used by the computer.

A) RAM slack
B) Edge slack
C) Drive file slack
D) Sector slack
Question
What are the steps in damage control?
Question
What are the objectives of disaster exercises?
Question
____________________ is data about data.
Question
Identify two scenarios that could be used in a BIA.
Question
The air-handling space above drop ceilings (and sometimes even between the walls and under structural floors) used to circulate and otherwise handle air in a building are called ____________________.
Question
Describe the purpose of a disaster recovery plan.
Question
What is required upon completion of an evidence examination?
Question
What does Windows do if a file being saved is not long enough to fill up the last sector on the disk?
Question
Match between columns
The sudden flow of electric current between two objects
Business continuity
The sudden flow of electric current between two objects
MTTR
The sudden flow of electric current between two objects
Business continuity planning and testing
The sudden flow of electric current between two objects
Succession planning
The sudden flow of electric current between two objects
BIA
The sudden flow of electric current between two objects
Disaster recovery
The sudden flow of electric current between two objects
MTBF
The sudden flow of electric current between two objects
ESD
The sudden flow of electric current between two objects
Forensics
The ability of an organization to maintain its operations and services in the face of a disruptive event
Business continuity
The ability of an organization to maintain its operations and services in the face of a disruptive event
MTTR
The ability of an organization to maintain its operations and services in the face of a disruptive event
Business continuity planning and testing
The ability of an organization to maintain its operations and services in the face of a disruptive event
Succession planning
The ability of an organization to maintain its operations and services in the face of a disruptive event
BIA
The ability of an organization to maintain its operations and services in the face of a disruptive event
Disaster recovery
The ability of an organization to maintain its operations and services in the face of a disruptive event
MTBF
The ability of an organization to maintain its operations and services in the face of a disruptive event
ESD
The ability of an organization to maintain its operations and services in the face of a disruptive event
Forensics
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
Business continuity
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
MTTR
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
Business continuity planning and testing
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
Succession planning
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
BIA
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
Disaster recovery
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
MTBF
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
ESD
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
Forensics
The average time until a component fails, cannot be repaired, and must be replaced
Business continuity
The average time until a component fails, cannot be repaired, and must be replaced
MTTR
The average time until a component fails, cannot be repaired, and must be replaced
Business continuity planning and testing
The average time until a component fails, cannot be repaired, and must be replaced
Succession planning
The average time until a component fails, cannot be repaired, and must be replaced
BIA
The average time until a component fails, cannot be repaired, and must be replaced
Disaster recovery
The average time until a component fails, cannot be repaired, and must be replaced
MTBF
The average time until a component fails, cannot be repaired, and must be replaced
ESD
The average time until a component fails, cannot be repaired, and must be replaced
Forensics
Focuses on protecting and restoring the information technology functions and services that support the business
Business continuity
Focuses on protecting and restoring the information technology functions and services that support the business
MTTR
Focuses on protecting and restoring the information technology functions and services that support the business
Business continuity planning and testing
Focuses on protecting and restoring the information technology functions and services that support the business
Succession planning
Focuses on protecting and restoring the information technology functions and services that support the business
BIA
Focuses on protecting and restoring the information technology functions and services that support the business
Disaster recovery
Focuses on protecting and restoring the information technology functions and services that support the business
MTBF
Focuses on protecting and restoring the information technology functions and services that support the business
ESD
Focuses on protecting and restoring the information technology functions and services that support the business
Forensics
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
Business continuity
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
MTTR
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
Business continuity planning and testing
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
Succession planning
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
BIA
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
Disaster recovery
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
MTBF
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
ESD
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
Forensics
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
Business continuity
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
MTTR
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
Business continuity planning and testing
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
Succession planning
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
BIA
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
Disaster recovery
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
MTBF
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
ESD
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
Forensics
The application of science to questions that are of interest to the legal profession
Business continuity
The application of science to questions that are of interest to the legal profession
MTTR
The application of science to questions that are of interest to the legal profession
Business continuity planning and testing
The application of science to questions that are of interest to the legal profession
Succession planning
The application of science to questions that are of interest to the legal profession
BIA
The application of science to questions that are of interest to the legal profession
Disaster recovery
The application of science to questions that are of interest to the legal profession
MTBF
The application of science to questions that are of interest to the legal profession
ESD
The application of science to questions that are of interest to the legal profession
Forensics
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 13: Business Continuity
1
Most metadata about a file is generated and recorded automatically without the user's knowledge.
True
2
Duplicate image backups are considered a primary key to uncovering evidence because they create exact replicas of the crime scene.
False
3
In a(n) ____ cluster, every server in the cluster performs useful work.

A) symmetric network
B) asymmetric network
C) symmetric server
D) symmetric network
C
4
A ____ is a service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service.

A) service level agreement
B) recovery point objective
C) recovery time objective
D) service point agreement
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
A(n) ____ is a device that maintains power to equipment in the event of an interruption in the primary electrical power source.

A) uninterruptible power supply
B) redundant power supply
C) uninterruptible system supply
D) replica power supply
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
____ is a form of eavesdropping in which special equipment is used to pick up telecommunication signals or data within a computer device by monitoring the electromagnetic fields.

A) Newton phreaking
B) Van Eck phreaking
C) Van Zek hacking
D) EMF phreaking
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
The ____ response team serves as first responders whenever digital evidence needs to be preserved.

A) incident
B) computer forensics
C) risk
D) emergency
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
In a(n) ____ cluster, a standby server exists only to take over for another server in the event of its failure.

A) symmetric network
B) symmetric server
C) asymmetric network
D) asymmetric server
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
____ uses technology to search for computer evidence of a crime, can attempt to retrieve information-even if it has been altered or erased-that can be used in the pursuit of the attacker or criminal.

A) Computer forensics
B) Penetration testing
C) Vulnerability testing
D) Risk management
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
System availability is often expressed as a percentage of uptime in a year.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
A ____ typically begins by identifying threats through a risk assessment.

A) BRA
B) BAA
C) BPA
D) BIA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
A ____ is a metallic enclosure that prevents the entry or escape of an electromagnetic field.

A) bollard
B) mantrap
C) Faraday cage
D) Newton cage
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
A ____ is a component or entity in a system which, if it no longer functions, will disable the entire system.

A) recovery site
B) recovery point
C) single point of failure
D) cascade point of failure
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
____ is designed to ensure that an organization can continue to function in the event of a natural or man-made disaster.

A) Business continuity planning and testing
B) Disaster planning
C) Business management planning and testing
D) Enterprise disaster planning
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
____ plans typically include procedures to address redundancy and fault tolerance as well as data backups.

A) Enterprise recovery
B) Disaster recovery
C) Business recovery
D) Emergency recovery
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
A ____ has all of the equipment installed, but does not have active Internet or telecommunications facilities, and does not have current backups of data.

A) cold site
B) hot site
C) spare site
D) warm site
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
____ data is the most difficult type of data to capture.

A) Volatile
B) Static
C) Non-volatile
D) Persistent
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
According to the Federal Bureau of Investigation (FBI), almost ____ percent of crimes committed today leave behind digital evidence that can be retrieved through computer forensics.

A) 65
B) 75
C) 85
D) 95
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
RAM slack can contain any information that has been created, viewed, modified, downloaded, or copied since the computer was last booted.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
A subset of business continuity planning and testing is disaster recovery, also known as IT recovery planning.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
____ pertains only to the last sector of a file.

A) Disk slack
B) RAM slack
C) ROM slack
D) Edge slack
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
The ____ documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence.

A) chain of value
B) chain of use
C) chain of property
D) chain of custody
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
Discuss the purpose and importance of the chain of custody.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
Generally, ____________________ focuses on restoring computing and technology resources to their former state.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
A(n) ____ backup is an evidence-grade backup because its accuracy meets evidence standards.

A) baseline
B) mirror image
C) logical image
D) thin image
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
A ____ is a snapshot of the current state of the computer that contains all current settings and data.

A) system standard
B) system view
C) system image
D) system baseline
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Windows stores files on a hard drive in 512-byte blocks called ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Multiple sectors are used to make up a ____.

A) cluster
B) track
C) slice
D) platter
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Describe what happens when the response team arrives and secures the crime scene.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Describe the Windows page file and discuss why it can be important for evidence recovery.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
RAID 0 technology is based on ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Explain how to best capture volatile data.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
____ could contain remnants of previously deleted files or data from the format pattern associated with disk storage space that has yet to be used by the computer.

A) RAM slack
B) Edge slack
C) Drive file slack
D) Sector slack
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
What are the steps in damage control?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What are the objectives of disaster exercises?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
____________________ is data about data.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Identify two scenarios that could be used in a BIA.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
The air-handling space above drop ceilings (and sometimes even between the walls and under structural floors) used to circulate and otherwise handle air in a building are called ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Describe the purpose of a disaster recovery plan.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What is required upon completion of an evidence examination?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
What does Windows do if a file being saved is not long enough to fill up the last sector on the disk?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
The sudden flow of electric current between two objects
Business continuity
The sudden flow of electric current between two objects
MTTR
The sudden flow of electric current between two objects
Business continuity planning and testing
The sudden flow of electric current between two objects
Succession planning
The sudden flow of electric current between two objects
BIA
The sudden flow of electric current between two objects
Disaster recovery
The sudden flow of electric current between two objects
MTBF
The sudden flow of electric current between two objects
ESD
The sudden flow of electric current between two objects
Forensics
The ability of an organization to maintain its operations and services in the face of a disruptive event
Business continuity
The ability of an organization to maintain its operations and services in the face of a disruptive event
MTTR
The ability of an organization to maintain its operations and services in the face of a disruptive event
Business continuity planning and testing
The ability of an organization to maintain its operations and services in the face of a disruptive event
Succession planning
The ability of an organization to maintain its operations and services in the face of a disruptive event
BIA
The ability of an organization to maintain its operations and services in the face of a disruptive event
Disaster recovery
The ability of an organization to maintain its operations and services in the face of a disruptive event
MTBF
The ability of an organization to maintain its operations and services in the face of a disruptive event
ESD
The ability of an organization to maintain its operations and services in the face of a disruptive event
Forensics
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
Business continuity
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
MTTR
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
Business continuity planning and testing
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
Succession planning
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
BIA
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
Disaster recovery
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
MTBF
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
ESD
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
Forensics
The average time until a component fails, cannot be repaired, and must be replaced
Business continuity
The average time until a component fails, cannot be repaired, and must be replaced
MTTR
The average time until a component fails, cannot be repaired, and must be replaced
Business continuity planning and testing
The average time until a component fails, cannot be repaired, and must be replaced
Succession planning
The average time until a component fails, cannot be repaired, and must be replaced
BIA
The average time until a component fails, cannot be repaired, and must be replaced
Disaster recovery
The average time until a component fails, cannot be repaired, and must be replaced
MTBF
The average time until a component fails, cannot be repaired, and must be replaced
ESD
The average time until a component fails, cannot be repaired, and must be replaced
Forensics
Focuses on protecting and restoring the information technology functions and services that support the business
Business continuity
Focuses on protecting and restoring the information technology functions and services that support the business
MTTR
Focuses on protecting and restoring the information technology functions and services that support the business
Business continuity planning and testing
Focuses on protecting and restoring the information technology functions and services that support the business
Succession planning
Focuses on protecting and restoring the information technology functions and services that support the business
BIA
Focuses on protecting and restoring the information technology functions and services that support the business
Disaster recovery
Focuses on protecting and restoring the information technology functions and services that support the business
MTBF
Focuses on protecting and restoring the information technology functions and services that support the business
ESD
Focuses on protecting and restoring the information technology functions and services that support the business
Forensics
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
Business continuity
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
MTTR
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
Business continuity planning and testing
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
Succession planning
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
BIA
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
Disaster recovery
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
MTBF
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
ESD
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
Forensics
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
Business continuity
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
MTTR
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
Business continuity planning and testing
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
Succession planning
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
BIA
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
Disaster recovery
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
MTBF
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
ESD
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
Forensics
The application of science to questions that are of interest to the legal profession
Business continuity
The application of science to questions that are of interest to the legal profession
MTTR
The application of science to questions that are of interest to the legal profession
Business continuity planning and testing
The application of science to questions that are of interest to the legal profession
Succession planning
The application of science to questions that are of interest to the legal profession
BIA
The application of science to questions that are of interest to the legal profession
Disaster recovery
The application of science to questions that are of interest to the legal profession
MTBF
The application of science to questions that are of interest to the legal profession
ESD
The application of science to questions that are of interest to the legal profession
Forensics
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.