Derrick logs on to a system in order to read a file. In this example. Derrick is the ______?
Correct Answer:A
A security practitioner who needs step-by-step instructions to complete a provisioning task
Correct Answer:C
A company performs an analysis of its information systems requirements functions and interdependences in order to prioritize contingency requirement. What is this process called?
Correct Answer:D
Security control used to protect against environmental threats such as fire, flood and earth quakes
Correct Answer:A
How often should an organization test its business continuity plan
Correct Answer:C