CIS 359 STUDY Extraordinary Success /cis359study.com CIS 359 STUDY Extraordinary Success /cis359study.c | Page 26
for response to incidents, recovery from disasters, and
reestablishment of operations for continuity.
19. The ____ job functions and organizational roles focus on
protecting the organization’s information systems and stored
information from attacks.
20. The ____ is the point in time by which systems and data must be
recovered after an outage as determined by the business unit.
21. Within an organization, a(n) ____ is a group of individuals who
are united by shared interests or values and who have a common goal
of making the organization function to meet its objectives.
22. The ____ is used to collect information directly from the end
users and business managers.
23. The final component to the CPMT planning process is to deal
with ____.
24. The last stage of a business impact analysis is prioritizing the
resources associated with the ____, which brings a better
understanding of what must be recovered first.
25. The ____ is an investigation and assessment of the impact that
various events or incidents can have on the organization.
26. The ____ job functions and organizational roles focus on costs of
system creation and operation, ease of use for system users, timeliness
of system creation, and transaction response time.
27. A(n) ____ is an extension of an organization’s intranet into cloud
computing.
28. A ____ is a contractual document guaranteeing certain minimal
levels of service provided by a vendor.
29. A ____ is an agency that provides physical facilities in the event
of a disaster for a fee.