What usually follows the fact-finding meetings which follow a recovery, whether drill or real?

A) A walk-through test B) Blame for failure is assigned as needed
C) Changes to the recovery plan D) A completely new recovery plan

C

Computer Science & Information Technology

You might also like to view...

Which of the following can be used to prevent a buffer overflow attack?

a. DEP b. FIM c. VPN d. DNS

Computer Science & Information Technology

Which of the following would be an example of fair use?

a. A parody of a dramatic movie. b. Reprinting an art illustration in a advertisement. c. Photographs in a coffee table book. d. Sampling a song and looping it to create a hip hop beat.

Computer Science & Information Technology