1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alekssr [168]
3 years ago
6

How do big organizations take back their data to be reviewed after a disaster?

Computers and Technology
1 answer:
Jet001 [13]3 years ago
4 0
Here a 5 step recovery plan, I have been in IT for 8 years

1. Create a disaster recovery team.

The team will be responsible for developing, implementing, and maintaining the DRP. A DRP should identify the team members, define each member’s responsibilities, and provide their contact information. The DRP should also identify who should be contacted in the event of a disaster or emergency. All employees should be informed of and understand the DRP and their responsibility if a disaster occurs.

2. Identify and assess disaster risks.

Your disaster recovery team should identify and assess the risks to your organization. This step should include items related to natural disasters, man-made emergencies, and technology related incidents. This will assist the team in identifying the recovery strategies and resources required to recover from disasters within a predetermined and acceptable timeframe.

3. Determine critical applications, documents, and resources.

The organization must evaluate its business processes to determine which are critical to the operations of the organization. The plan should focus on short-term survivability, such as generating cash flows and revenues, rather than on a long term solution of restoring the organization’s full functioning capacity. However, the organization must recognize that there are some processes that should not be delayed if possible. One example of a critical process is the processing of payroll.

4. Specify backup and off-site storage procedures.

These procedures should identify what to back up, by whom, how to perform the backup, location of backup and how frequently backups should occur. All critical applications, equipment, and documents should be backed up. Documents that you should consider backing up are the latest financial statements, tax returns, a current list of employees and their contact information, inventory records, customer and vendor listings. Critical supplies required for daily operations, such as checks and purchase orders, as well as a copy of the DRP, should be stored at an off-site location.

5. Test and maintain the DRP.

Disaster recovery planning is a continual process as risks of disasters and emergencies are always changing. It is recommended that the organization routinely test the DRP to evaluate the procedures documented in the plan for effectiveness and appropriateness. The recovery team should regularly update the DRP to accommodate for changes in business processes, technology, and evolving disaster risks.



summary :an organization must develop a recovery team to create a disaster recovery plan that includes identifying and assessing disaster risks, determining critical applications, and specifying backup procedures. Other procedures may be included in the plan based on the organization. The recovery team and organization must then implement the DRP and follow through on the plan procedures. The DRP should be continually tested and maintained to consistently prepare the organization for evolving disasters and emergencies.
You might be interested in
Your organization is planning to deploy wireless access points across their campus network, and you have been tasked with securi
AlladinOne [14]

Answer:

Controller APs is the correct answer to the following question.

Explanation:

Because controller APs is the type of APs you can secure your wireless access point of the campus and any other organization. This is one of the better ways to protect or secure your AP that can be controlled by the individual device which permit the centralized management.

So, that's why the following option is correct.

7 0
3 years ago
You order a new personal computer. A representative from the store calls to ask if you need CD-copying software in your personal
VashaNatasha [74]

Answer:

A.

Explanation:

The purpose of a CD-copying software is that it records data on a recordable CD.

7 0
3 years ago
How much time does a gold chest take to open
MaRussiya [10]

Gold chest takes 8 hours to open or unlock.

<u>Explanation:</u>

Clash royale is a game which has been developed and published with the help of a super cell. It is a video game. Many players can play this game at the same time. In the sense, clash royale is a multi player game.

In this game, the players who are playing the game are awarded with the gold chest. They are also awarded with the gems. In order to unlock or open a gold chest eight hours are needed. Apart from this there is an other way also with which the gold chest can be unlocked. It can be unlocked with the help of forty eight gems.

7 0
3 years ago
Note that common tasks are listed toward the top, and less common tasks are listed toward the bottom. According to O*NET, what a
Aleksandr-060686 [28]

Answer:

1). organizing and leading religious services.

3). praying and promoting spirituality.

4). preparing and delivering sermons or talks.

5). reading from sacred texts.

Explanation:

The clergy is defined as the 'body of persons including ministers, sheiks, priests, and rabbis who are trained and ordained for religious service.' Thus, <u>the more common tasks performed by them include arranging and directing the religious services along with calling upon and encouraging spirituality amongst people</u>. <u>While the less common tasks carried out by them include assembling and carrying out sermons and studying the religious texts</u>. Thus, <u>options 1, 3, 4, and 5</u> are the correct options.

8 0
3 years ago
What are options in the Advanced tab in the Share Workbook dialog box? Check all that apply
madam [21]
Where are the options

7 0
3 years ago
Read 2 more answers
Other questions:
  • We have to calculate the percentage of marks obtained in three subjects (each out of 100) by student A and in four subjects (eac
    11·1 answer
  • As you're helping a user configure her e-mail over the phone, she remarks that the IP address is different than it was when she
    6·1 answer
  • Given the following code, what is output by the method call, mystery(6 * 8)?
    8·1 answer
  • How can vlan hopping attacks be prevented on a network?
    10·1 answer
  • Name three types of data stored on a computer’s hard disk
    11·1 answer
  • Which of the following is an example of a formal business standard
    14·2 answers
  • In regard to protective actions for explosive devices, the area where the blast originates is referred to as ___________ perimet
    8·1 answer
  • A key field is used to _____. enter a password uniquely identify records merge data list the most important information
    12·2 answers
  • _____ are independent and not associated with the marketing efforts of any particular company or brand.​
    9·1 answer
  • When network traffic is encrypted, it is invisible and its content and purpose are masked.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!