CIS 359 STUDY Extraordinary Success /cis359study.com CIS 359 STUDY Extraordinary Success /cis359study.c | Page 20
Some recovery strategies seek to improve the ____ of a server or
system in addition to, or instead of, performing backups of data.
Question 25
The ____ is used to collect information directly from the end users
and business managers.
Question 26
The purpose of the ____ is to define the scope of the CP operations
and establish managerial intent with regard to timetables for response
to incidents, recovery from disasters, and reestablishment of
operations for continuity.
Question 27
To a large extent, incident response capabilities are part of a normal
IT budget. The only area in which additional budgeting is absolutely
required for incident response is the maintenance of ____.
Question 28
An manual alternative to the normal way of accomplishing an IT task
might be employed in the event that IT is unavailable. This is called a
____.
Question 29
What is a common approach used in the discipline of systems analysis
and design to understand the ways systems operate and to chart
process flows and interdependency studies?
Question 30
Which of the following collects and provides reports on failed login
attempts, probes, scans, denial-of-service attacks, and detected
malware?
Question 31