The threat evaluation process performed when designing a business continuity plan (BCP) or disaster recovery plan (DRP) evaluates risk in light of work process and is similar in nature to the technique used when designing security policies. What is this threat evaluation process called?
A Business impact analysis
B Quantitative analysis
C Qualitative analysis
D Threat modeling
Answer: A Business impact analysis
You might also like to view...
Which of the following statements about purchasing and installing software is FALSE?
A) To ensure that new software will work with your computer, you should check the system requirements, which specify the minimum standards needed for the program to run properly. B) Many software programs only require you to insert the program CD for installation to start. C) Downloaded software programs often arrive in one compressed file containing everything needed to install and run the program. D) If a program is written for your operating system, it will always work on your computer.
The ____ protocol specifies how to encode nontext data, such as graphics or sound, so it can travel over the Internet. ?
A. ?POP B. ?SMTP C. ?MIME D. ?IMAP