COMPUTER THREATS SECURITY
COMPUTER SECURITY POLICIES EXAMPLES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Establishing the severity of the attack
|
|
Definition of the backup process
|
|
Analysis of the cause of the disaster
|
|
Timeline for data recovery
|
Detailed explanation-1: -A disaster recovery plan is a comprehensive program that covers the widest possible scenario, addressing risks such as lack of connectivity, destruction of hardware, data corruption, and cyber attacks. A disaster recovery policy defines, concretely, how the organization will behave when a disaster occurs.
Detailed explanation-2: -The three phases of disaster recovery include assessment, restoration, and recovery.
Detailed explanation-3: -Backup and restore. Backup and restore is a suitable approach for mitigating against data loss or corruption. This approach can also be used to mitigate against a regional disaster by replicating data to other AWS Regions, or to mitigate lack of redundancy for workloads deployed to a single Availability Zone.