Multiple Choice
________ is the reestablishment of information technology operations after a disaster.
A) Business continuity recovery
B) Disaster recovery
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q4: When a packet that is not part
Q9: Oversight activities include _.<br>A) vulnerability testing<br>B) creating
Q20: Viruses most commonly spread from one computer
Q37: In digital certificate authentication,the verifier uses _.<br>A)the
Q50: Biometrics is the use of body measurements
Q51: Most hackers today are driven by curiosity,a
Q55: Which phase of the plan-protect-respond cycle takes
Q57: CSIRTs should include _.<br>A)IT personnel<br>B)senior line managers<br>C)both
Q59: It is still hacking if a person
Q104: In authentication,the _ is the party trying