Question: Please answer as much as you can answer QUESTION 1 For each of the following strategies, answer Agree if the strategy will typically involve one-time
Please answer as much as you can answer
QUESTION 1 For each of the following strategies, answer Agree if the strategy will typically involve one-time costs, or answer Disagree if the strategy will typically involve recurring costs.
A. Development of the initial Business Continuity Plan
a. Agree b. Disagree
QUESTION 2
B. Cybersecurity insurance
a. Agree b. Disagree
QUESTION 3
C. Installation of fire suppression equipment
a. Agree b. Disagree
QUESTION 4
D. Purchase of redundant server hardware and software for a hot alternate IT site
a. Agree b. Disagree
QUESTION 5
E. Outsourcing of security personnel for facilities
a. Agree b. Disagree
QUESTION 6
F. Stocking of personal protective devices (masks, gloves) that have a shelf life of many years.
a. Agree b. Disagree
QUESTION 7 G. Annual review and update of the BCP
a. Agree b. Disagree
QUESTION 8 H. Installation of a backup generator
a. Agree b. Disagree
QUESTION 9 I. Fuel used to periodically test the backup generator
a. Agree b. Disagree
QUESTION 10 J. Permanent relocation of the organization to another city to avoid flood issues
a. Agree b. Disagree
QUESTION 11 For each question, Identify which IT Security Consideration is being addressed. Pick from the following list
A- Operating Systems & System Software Security
B- Application Security
C-Data base Security
D- Network Security
E-Mobile Device Security
F- Social Networking
11- a. Weedy patching (installation of updates) for Microsoft Windows on workstation and server
QUESTION 12 b. Running daily SQL integrity checks on business data
QUESTION 13 C Cresting written policies on the use of Facebook
QUESTION 14 d. Requiring all business-provided cell phones to use biometrics to unlock the device
QUESTION 15 e. Installing security updates to Microsoft Office
QUESTION 16 f. logging all blocked internet traffic for analysis
QUESTION 17 g. Disabling the use of macros in Microsoft Excel
QUESTION 18 h. Tracking company cell phones and laptops by logging their GPS coordinates
QUESTION 19 L. Blocking the use of Snapchat or Instagram on business computers
QUESTION 20 J. Storing data backups offline in a separate facility
QUESTION 21 k. Installation of an internet firewall to stop hackers
QUESTION 22 I. Being able to remotely erase all data from a lost company cell phone
QUESTION 23 m. Encryption of all business- related data stored on company servers
QUESTION 24 n. Preventing users from Installing their own programs on a workstation without permission
QUESTION 25 O. Removing all computers running an unsupported/ obsolete version of windows (e.g windows XP)
QUESTION 26 What are the 5 objectives of the Business Continuity Plan?
QUESTION 27 In a typical BCP, which of the following are considered major sections?
a. Objectives
True or False
QUESTION 28 b. Financial Planning
True or False
QUESTION 29 C. Requirements
True or False
QUESTION 30 d. Social Distancing Planning
True or False
QUESTION 31 e. Cybersecurity
True or False
QUESTION 32 f. Strategies
True or False
QUESTION 33 g. Maintenance
True or False
The following is fill in the blank question - Q34
Question 34 - Which major BCP section separates the planning and preperation activities from the response and recovery activities?
Q 35- provide the term or name associated with each of the following definitions.
a. the location where terms gather and execute the ERP and BCP contains emergency supplies and equipment.
Q-36 b. Period of time where there are indications that the manifestation of a threat is credible.
Q-37 c. Period of time when a crisis has the most direct impact to an organization
Q-38 d. Period of time after a crisis has been contained and controlled, and before all operations are fully recovered.
Q-39 What are the four phases of emergency management as identified by FEMA?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
