1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulsSmile [24]
3 years ago
8

A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the

following should be at the top of the CISO's list?
a. identify redundant and high-availability systems
b. identify mission-critical applications and systems
c. identify the single point of failure in the systems
d. identify the impact on safety of the property
Computers and Technology
1 answer:
nataly862011 [7]3 years ago
4 0

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

You might be interested in
When typing in a cell, hitting Tab will bring which result?
alexandr402 [8]

it's B I took the test :)

8 0
3 years ago
Read 2 more answers
What statement is used to close a loop started with a for statement?
liraira [26]
If I get what you are saying then you could use a work like end. :)
5 0
3 years ago
Which rule should be followed to stay safe online?
anyanavicka [17]

Answer:

Avoid sharing photos with anyone online.

Explanation:

People can track you down. Its not worth to be kidnapped. Stay safe.

4 0
3 years ago
The ability of a language to let a programmer develop a program on computer system that can be run on other systems is called
kakasveta [241]
It is called 'portability'.
6 0
3 years ago
One of the key advantages the soviet union held over the united states on a global scale was america's continuing issue of:_____
ikadub [295]

Explanation:

The Americans had a greater nuclear power with more than 300 land based intercontinental ballistic missiles (ICBMs) and a fleet of Polaris submarines. The Soviet Union had only 4 to 6 land based ICBMs and around 100 short range primitive V1 type cruise missiles that could only be launched from surfaced submarines.

6 0
2 years ago
Other questions:
  • What is intensity? this is for digital arts
    12·1 answer
  • Jane is a postproduction crewmember for a film. Her responsibilities include arranging all the scenes that have been shot into t
    7·1 answer
  • What is the decimal equivalent of (11000 + 10000)/101?
    10·1 answer
  • What document type would be best to communicate sales items from a business to potential customer?
    12·1 answer
  • Create a structure named planet This structure will contain distance from Earth as an integer Atmosphere, language, people and p
    8·1 answer
  • How is kerning used in Word?
    7·2 answers
  • Examples of application software​
    7·2 answers
  • Using filtering as a strategy to deal with information overload requires Group of answer choices reviewing all unsolicited infor
    14·1 answer
  • In Python, how would you print the first 4 characters of "Help me pass!"
    8·1 answer
  • Why header files are needed in every c program ?expalin​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!