The maximum amount of time that a system resource can remain unavailable before there is an unacceptable impact on other system resources and supported business processes is known as __________.
A. maximum tolerable downtime (MTD)
B. recovery point objective (RPO)
C. work recovery time (WRT)
D. recovery time objective (RTO)
Answer: D
Computer Science & Information Technology
You might also like to view...
Although numerous applications are available to edit digital photographs, detecting those changes is possible. For example, an investigator can review a photograph's ________ and see whether changes were made and when
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which of the following is an accurate set of characteristics you would find in an attack signature?
A. IP address, attacker's alias, UDP options B. protocol options, TCP ports, region of origin C. IP address, TCP flags, port numbers D. IP number, MAC address, TCP options
Computer Science & Information Technology