Which of the following is the first major task in the BIA, according to NIST SP 800-34, Rev. 1?

A. Calculate asset valuation and combine with the likelihood and impact of potential attacks in a TVA worksheet.
B. Determine mission/business processes and recovery criticality.
C. Identify resource requirements.
D. Identify recovery priorities for system resources.

Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following applications would a deque not be well suited for?

a. Applications that require frequent insertions and deletions at the front of a container. b. Applications that require frequent insertions and deletions in the middle of a container. c. Applications that require frequent insertions and deletions at the back of a container. d. Applications that require frequent insertions and deletions at the front and at the back of a container.

Computer Science & Information Technology

Perform the task specified by each of the following statements:

a) Write the function header for a function called exchange that takes two pointers to dou- ble-precision, floating-point numbers x and y as parameters and does not return a value. b) Write the function prototype without parameter names for the function in part (a). c) Write two statements that each initialize the built-in array of chars named vowel with the string of vowels, "AEIOU".

Computer Science & Information Technology