1.
Which of the following is a large hardware/software backup system that uses the RAID technology?
2.
What is the MOST critical piece to disaster recovery and continuity planning?
3.
During the testing of the business continuity plan (BCP), which of the following methods of results analysis provides the BEST assurance that the plan is workable?
4.
Which of the following statements regarding an off-site information processing facility is TRUE?
5.
Business Continuity and Disaster Recovery Planning (Primarily) addresses the:
6.
Which of the following best defines a Computer Security Incident Response Team (CSIRT)?
7.
If an employee's computer has been used by a fraudulent employee to commit a crime, the hard disk may be seized as evidence and once the investigation is complete it would follow the normal steps of the Evidence Life Cycle. In such case, the Evidence life cycle would not include which of the following steps listed below?
8.
If an organization were to monitor their employees' e-mail, it should not:
9.
A server farm consisting of multiple similar servers seen as a single IP address from users interacting with the group of servers is an example of which of the following?
10.
Which of the following is NOT a common backup method?