Which of the following control measures are considered while creating a disaster recovery plan? Each correct answer represents a part of the solution. Choose three.
Which of the following are some of the parts of a project plan? Each correct answer represents a complete solution. Choose all that apply.
Team members list
Which of the following statements are true about classless routing protocols? Each correct answer represents a complete solution. Choose two The same subnet mask is used everywhere on the network.
They extend the IP addressing scheme.
IGRP is a classless routing protocol.
They support VLSM and discontinuous networks.
Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?
Availability Management deals with the day-to-day availability of services. Which of the following takes over when a 'disaster' situation occurs?
Service Level Management
Service Continuity Management
IT Service Continuity Management (ITSCM) is used to support the overall Business Continuity Management (BCM) in order to ensure that the required IT infrastructure and the IT service provision are recovered within an agreed business time scales. Which of the following are the benefits of implementing IT Service Continuity Management? Each correct answer represents a complete solution. Choose all that apply.
It prioritizes the recovery of IT services by working with BCM and SLM.
It minimizes costs related with recovery plans using proper proactive planning and testing.
It confirms competence, impartiality, and performance capability of an organization that performs audits.
It minimizes disruption in IT services when it follows a major interruption or disaster.
You work as an Incident handling manager for Orange sect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?