What usually follows the fact-finding meetings which follow a recovery, whether drill or real?
A) A walk-through test B) Blame for failure is assigned as needed
C) Changes to the recovery plan D) A completely new recovery plan
C
Computer Science & Information Technology
You might also like to view...
Which of the following can be used to prevent a buffer overflow attack?
a. DEP b. FIM c. VPN d. DNS
Computer Science & Information Technology
Which of the following would be an example of fair use?
a. A parody of a dramatic movie. b. Reprinting an art illustration in a advertisement. c. Photographs in a coffee table book. d. Sampling a song and looping it to create a hip hop beat.
Computer Science & Information Technology