Which of the following are external team members that may need to be involved in a disaster recovery plan?

A) Cleaning service providers B) Red Cross
C) Police D) All of the above

D

Computer Science & Information Technology

You might also like to view...

Manipulating someone within an organization to gain access to confidential information is called

a. diving. b. hacking. c. phreaking. d. social engineering. e. trashing.

Computer Science & Information Technology

Design view should be used to modify a report when the user wants to add lines, rectangles, and other controls only available in Design view. ____________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology