Multiple Choice
An information technology director collected the names and locations of key vendors,current hardware configuration,names of team members,and an alternative processing location.What is the director most likely preparing?
A) Data restoration plan.
B) Disaster recovery plan.
C) System security policy.
D) System hardware policy.
Correct Answer:

Verified
Correct Answer:
Verified
Q47: Which of the following is not included
Q48: The goal of information security management is
Q49: Which of the following statements is most
Q50: Spam is a self-replicating program that runs
Q51: Which of the following statements is true
Q53: One type of fault tolerance is using
Q54: A Trojan Horse is a self-replicating,self-propagating,self-contained program
Q55: Asymmetric-key encryption is suitable for encrypting large
Q56: Encryption is a control that changes plain
Q57: Symmetric-key encryption is rarely used today due