1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulsSmile [24]
3 years ago
8

A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the

following should be at the top of the CISO's list?
a. identify redundant and high-availability systems
b. identify mission-critical applications and systems
c. identify the single point of failure in the systems
d. identify the impact on safety of the property
Computers and Technology
1 answer:
nataly862011 [7]3 years ago
4 0

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

You might be interested in
Alan is the security manager for a mid-sized business. The company has suffered several serious data losses when mobile devices
Kipish [7]

Disk encryption is highly risky response.

<u>Explanation:</u>

To protect or loss of serial data loss on mobile devices it is not advisable to implement full disk encrypted. Once full disk encrypted is implemented mobile access is very slow. End-user will complain to IT administrator.

Best solution either removes unwanted or unauthorized application from mobile to protect the data loss. Install antivirus program in each mobile.

Access or permission to application is removed so that mobile data loss can be avoided.  End user should also be advised not to click on any link which they receive through SMS messages or other through any applications.

5 0
3 years ago
When microsoft released word for windows, wordperfect had about 80 percent of the word processing market. microsoft donated free
irina1246 [14]

When Microsoft donated copies of Word program to colleges and universities, the company Microsoft is using a Marketing Strategy in promoting the product. A good promotion will help the product to be known and by words of mouth it will basically promote the product and the users will definitely give comments on how the product performs.

7 0
3 years ago
7.2 code practice edhesive
goblinko [34]

Answer:

Explanation:

got a 100

7 0
3 years ago
Read 2 more answers
Cómo se puede evitar que desparescan los recursos de la zona de Michoacán
Aliun [14]
This should be put in the Spanish section <span />
8 0
3 years ago
Under what driving conditions will 2019 Nissan LEAF’s available Rear Cross Traffic Alert (RCTA) warn the driver if a vehicle is
Dmitriy789 [7]

Answer:

When the driver is <em>reversing the car</em>

Explanation:

The Rear Cross Traffic Alert (RCTA) is Nissan's <em>risk  of collision detector</em> that warns drivers if one or more cars are approaching the rear of your car when backing up from a parking space.  

Sensors around the back of the vehicle identify vehicles drawing nearer from the either way. A notice tone and glimmering light will appear and  alert the driver to stop.  

5 0
3 years ago
Other questions:
  • To name a computed field, follow the computation with the word ____ and then the name you wish to assign to the field
    8·1 answer
  • This is for the folks that is rude:
    12·1 answer
  • Which finger types the return or enter key?
    6·2 answers
  • Jim has to send an email to his boss requesting medical leave. in which field will Jim type the purpose of his email?​
    8·2 answers
  • What is the fastest way to move data over long distances using the internet, for instance across countries or continents to your
    13·1 answer
  • What was the first video game ever invented
    11·2 answers
  • What is the difference between websites and web page​
    8·1 answer
  • Lesson 2.7 Code Practice #2
    13·1 answer
  • In what situations might you need to use a function that calls another function?
    11·1 answer
  • Often, a single source does not contain the data needed to draw a conclusion. It may be necessary to combine data from a variety
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!