Which of the following should be included in the list of contacts in a disaster recovery plan?

A) Customers B) Computer vendor
C) Emergency services D) All of the above

D

Computer Science & Information Technology

You might also like to view...

Bookmarks are typically tagged with descriptive ________

A) buzz words B) keywords C) booktags D) keytags

Computer Science & Information Technology

A CALL statement inside the trigger body enables you to call ______.

A. A stored procedure. B. Another database trigger. C. A stored function. D. A package.

Computer Science & Information Technology