CIS 359 STUDY Extraordinary Success /cis359study.com CIS 359 STUDY Extraordinary Success /cis359study.c | Page 20

Some recovery strategies seek to improve the ____ of a server or system in addition to, or instead of, performing backups of data. Question 25 The ____ is used to collect information directly from the end users and business managers. Question 26 The purpose of the ____ is to define the scope of the CP operations and establish managerial intent with regard to timetables for response to incidents, recovery from disasters, and reestablishment of operations for continuity. Question 27 To a large extent, incident response capabilities are part of a normal IT budget. The only area in which additional budgeting is absolutely required for incident response is the maintenance of ____. Question 28 An manual alternative to the normal way of accomplishing an IT task might be employed in the event that IT is unavailable. This is called a ____. Question 29 What is a common approach used in the discipline of systems analysis and design to understand the ways systems operate and to chart process flows and interdependency studies? Question 30 Which of the following collects and provides reports on failed login attempts, probes, scans, denial-of-service attacks, and detected malware? Question 31