What plan often starts with a business impact analysis (BIA)? DRP

What plan often starts with a business impact analysis (BIA)?

What is the best definition of risk?
Risk is a timed event.
Risk is the likelihood that a loss will occur.
Risk is the loss of life.
Risk is the loss of equipment.

Which could be included in the computer incident recovery team (CIRT) plans?
Member responsibilities

The seven domains of a typical IT infrastructure are:
User, Workstation, LAN, LAN-to-WAN, Remote Access, WAN, System/Application
User, Workstation, LAN, LAN-to-MAN, Remote Access, MAN, System/Application
User, Computer, LAN, LAN-to-WAN, Remote Access, WAN, System/Application
User, Computer, LAN, LAN-to-WAN, Local Access, WAN, System/Application

What categories does alternate sites fall into when developing a disaster recovery plan?
Local, remote, offshore
Hot, warm, cold
Internal, external, remote
Top, middle, bottom

What item could you use to identify the organization’s mission-critical systems?
Critical outage times
PCI DSS review
Critical business functions
Disaster recovery plan

What is a POAM?
Project objectives and milestones
Project of action milestones
Plan of action and milestones
Planned objectives and milestones

What is the best method to use when evaluating two or more countermeasures to mitigate the same risk?

What permissions would you assign to grant users only the rights and permissions they need to perform their job?
Grant all
Limited rights
Separation of duties
Least privilege

What is the common automated vulnerability assessment tool used to perform scans?

Your organization has just been fined for a HIPAA violation, what is the maximum fine that can be levied?

Complete the formula for risk: Risk = __________.
Vulnerability X Mitigation
Threat X Exploit
Threat X Vulnerability
Threat / Vulnerability

Controls to minimize risks in information technology components have been applied. What is the remaining risk called?
Remaining risk
Residual risk
Mitigated risk
Managed risk

What alternate term is used in place of the maximum acceptable outage (MAO) that can be used in the disaster recovery plan (DRP)?

What type control has been approved by management but has not been installed yet?
Technical control
Physical control
Procedural control
Planned control

A company wants to know what the impact will be if a critical information technology database fails. What should they use?

What is a threat assessment?
Solves the mitigation effects from BIA
Determines the CIA for the system
Surveys the fixes of all assets
Identifies and evaluates potential loss

Accurate data is paramount in the risk assessment. What indicator should be included in the risk assessment report in reference to accurate data?
Uncertainty level
Validity level
Accuracy level
Probability level

What best explains the relationship of threats and vulnerabilities?
Threat, attack, vulnerability, assessment
Threat, attack, vulnerability, loss or impact
Threat, attack, vulnerability, mitigation
Threat, attack vulnerability, testing

When planning a risk assessment, what are the key items that need to be initially identified?
Assets, software, vulnerabilities, exploits
Assets, exploits, vulnerabilities, countermeasures
Assets, threats, vulnerabilities, countermeasures
Assets, people, vulnerability, exploits

Complete Answer:

Get Instant Help in Homework Asap
Get Instant Help in Homework Asap
Calculate your paper price
Pages (550 words)
Approximate price: -
Open chat
Hello 👋
Thank you for choosing our assignment help service!
How can I help you?