FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

COMPUTER SECURITY POLICIES EXAMPLES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What is meant by ‘trusted recovery’?
A
It is a process of salvaging inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media or files.
B
Bringing a system to an operable condition after a disaster so that it can again accept and process data.
C
An organized approach to addressing and managing the aftermath of a security breach or cyberattack
D
It is the ability to ensure recovery without compromise after a system failure.
Explanation: 

Detailed explanation-1: -Trusted recovery refers to mechanisms and procedures necessary to ensure that failures and discontinuities of operation don’t compromise a system’s secure operation.

Detailed explanation-2: -Definition(s): Ability to ensure recovery without compromise after a system failure.

Detailed explanation-3: -Definition(s): The procedures and processes of restoring a system, device or process that has been compromised back to a secure or trusted state, including destroying compromised keys, replacing compromised keys (as needed), and verifying the secure state of the recovered system.

There is 1 question to complete.