FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

COMPUTER SECURITY POLICIES EXAMPLES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following would be included in a disaster recovery policy?Choose two options.
A
Establishing the severity of the attack
B
Definition of the backup process
C
Analysis of the cause of the disaster
D
Timeline for data recovery
Explanation: 

Detailed explanation-1: -A disaster recovery plan is a comprehensive program that covers the widest possible scenario, addressing risks such as lack of connectivity, destruction of hardware, data corruption, and cyber attacks. A disaster recovery policy defines, concretely, how the organization will behave when a disaster occurs.

Detailed explanation-2: -The three phases of disaster recovery include assessment, restoration, and recovery.

Detailed explanation-3: -Backup and restore. Backup and restore is a suitable approach for mitigating against data loss or corruption. This approach can also be used to mitigate against a regional disaster by replicating data to other AWS Regions, or to mitigate lack of redundancy for workloads deployed to a single Availability Zone.

There is 1 question to complete.