100%(9)9 out of 9 people found this document helpful
This preview shows page 3 - 7 out of 14 pages.
Question 101 out of 1 pointsA(n) ____ is used to anticipate, react to, and recover from events that threaten the security of information and information assets in an organization; it is also used to restore the organization to normal modes of business operations;Question 111 out of 1 pointsA ____ is a document that describes how, in the event of a disaster, critical business functions continue at an alternate location while the
organization recovers its ability to function at the primary site.Question 121 out of 1 points____ hack systems to conduct terrorist activities through network or Internet pathways.Question 131 out of 1 points____ is the risk control approach that attempts to reduce the impact caused by the exploitation of vulnerability through planning and preparation.Question 141 out of 1 points____ ensures that only those with the rights and privileges to access information are able to do so.
Question 151 out of 1 points____ is a risk control approach that attempts to shift the risk to other assets, other processes, or other organizations.Question 161 out of 1 pointsA ____ attack seeks to deny legitimate users access to services by either tying up a server’s available resources or causing it to shut down.Question 171 out of 1 pointsInformation assets have ____ when authorized users - persons or computer systems - are able to access them in the specified format without interference or obstruction.Question 180 out of 1 pointsThe purpose of the ____ is to define the scope of the CP operations and establish managerial intent with regard to timetables for responseto incidents, recovery from disasters, and reestablishment of operations for continuity.