Security is a critical yet often overlooked consideration for BCDR planning.
At which stage of the planning process should security be involved?
Gathering business requirements can aid the organization in determining all of this information about organizational assets, except:
As part of the auditing process, getting a report on the deviations between intended configurations and actual policy is often crucial for an organization.
What term pertains to the process of generating such a report?
The goals of SIEM solution implementation include all of the following, except:
Which data protection strategy would be useful for a situation where the ability to remove sensitive data from a set is needed, but a requirement to retain the ability to map back to the original values is also present?
Cryptographic keys for encrypted data stored in the cloud should be ________________ .
DLP can be combined with what other security technology to enhance data controls?
With a federated identity system, what does the identity provider send information to after a successful authentication?
Which component of ITIL involves planning for the restoration of services after an unexpected outage or incident?
PDF + Testing Engine |
---|
$57.75 |
Testing Engine |
---|
$43.75 |
PDF (Q&A) |
---|
$36.75 |
ISC Free Exams |
---|
|