The maximum amount of time that a system resource can remain unavailable before there is an unacceptable impact on other system resources and supported business processes is known as __________.

A. maximum tolerable downtime (MTD)
B. recovery point objective (RPO)
C. work recovery time (WRT)
D. recovery time objective (RTO)

Answer: D

Computer Science & Information Technology

You might also like to view...

Although numerous applications are available to edit digital photographs, detecting those changes is possible. For example, an investigator can review a photograph's ________ and see whether changes were made and when

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is an accurate set of characteristics you would find in an attack signature?

A. IP address, attacker's alias, UDP options B. protocol options, TCP ports, region of origin C. IP address, TCP flags, port numbers D. IP number, MAC address, TCP options

Computer Science & Information Technology