1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maks197457 [2]
3 years ago
5

In addition to compiling the list of user access requirements, applications, and systems, the BIA also includes processes that a

re ____________. These processes safeguard against any risks that might occur due to key staff being unavailable or distracted.
Computers and Technology
1 answer:
laila [671]3 years ago
5 0

Answer:

automated

Explanation:

Basically a Business Impact Analysis (BIA) estimates and determines the effects of a business activity and process disturbances. These disruptions can be natural or electronic disasters. It also collects information which is used to establish recovery plan. It identifies the business vulnerabilities and works on the strategies in order to reduce such potential hazards. The BIA involves both manual and automated processes. BIA involves automated processes which include the automated software tools that enables the protection of the confidential information of the users and also generates automated reports about the critical business processes.

You might be interested in
This is Very very Important to me[BRAINLIEST)✅​
sineoko [7]

Answer:

Rom

mellisa

Explanation:

pls mark me BRAINLIAST

4 0
2 years ago
The MIQ inventory measures how much you value status. Which two measures are measures of status?
Alika [10]
It would be the social standing of a person and the economic standing of a person. 
6 0
3 years ago
If anyone did 3-d computer modeling can you answer these short questions mark Brainly really need help
Artemon [7]

Answer:

Answers all of them? or a certain one

4 0
3 years ago
What is mean by sole trading concern?​
DENIUS [597]

Answer:

trading as a whole

Explanation:

pls give brainlest almost lvled up.

6 0
3 years ago
List and describe two of the four generally recognized security positions.
Llana [10]
CISO: This person reports directly to the CIO and is responsible for assessing, managing, and implementing security.
Security Technician: Entry-level position and provides technical support to conFgure security hardware, implement security software, and diagnose and troubleshoot <span>problems</span>
8 0
3 years ago
Other questions:
  • In the context of organizational decisions at the tactical management level, _____ decisions are often used in resolving conflic
    9·1 answer
  • Judy forgot where she saved a certain file on her computer. Therefore, she searches for all files with a .jpg file extension. Wh
    10·2 answers
  • 0.005098 megaliters to liters. record your answer in whole liters
    7·1 answer
  • Allison’s computer is displaying a strange error message saying that Allison, who is an administrator, does not have access to a
    15·1 answer
  • Command create database in oracle database ::((
    8·1 answer
  • JPG is considered a lossy file format. What does this mean?
    15·2 answers
  • A program that doesn’t work properly needs to be debugged. true or false
    8·1 answer
  • Send me the answers<br>​
    15·1 answer
  • Which password attack method uses long lists of words that have been predefined and can be quickly downloaded for use to break a
    14·1 answer
  • Which discipline focuses on the design of computer hardware?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!