CIS 359 STUDY Extraordinary Success /cis359study.com CIS 359 STUDY Extraordinary Success /cis359study.c | Page 26

for response to incidents, recovery from disasters, and reestablishment of operations for continuity. 19. The ____ job functions and organizational roles focus on protecting the organization’s information systems and stored information from attacks. 20. The ____ is the point in time by which systems and data must be recovered after an outage as determined by the business unit. 21. Within an organization, a(n) ____ is a group of individuals who are united by shared interests or values and who have a common goal of making the organization function to meet its objectives. 22. The ____ is used to collect information directly from the end users and business managers. 23. The final component to the CPMT planning process is to deal with ____. 24. The last stage of a business impact analysis is prioritizing the resources associated with the ____, which brings a better understanding of what must be recovered first. 25. The ____ is an investigation and assessment of the impact that various events or incidents can have on the organization. 26. The ____ job functions and organizational roles focus on costs of system creation and operation, ease of use for system users, timeliness of system creation, and transaction response time. 27. A(n) ____ is an extension of an organization’s intranet into cloud computing. 28. A ____ is a contractual document guaranteeing certain minimal levels of service provided by a vendor. 29. A ____ is an agency that provides physical facilities in the event of a disaster for a fee.