You work as a security manager for SoftTech Inc. You along with your team are doing the disaster recovery for your project. Which of the following steps are performed by you for secure recovery based on the extent of the disaster and the organization's recovery ability?
Each correct answer represents a part of the solution. Choose three.
The steps performed for secure recovery in disasters is based on the extent of the disaster and the organization's recovery ability. The steps performed for secure recovery are as follows .
Recover at the primary operating site.
Recover to an alternate site for critical functions.
Restore full system after a catastrophic loss.
Answer option B is incorrect. This is not a valid answer for this Question.
CISM Review Manual 2010, Contents. 'Incident Management and Response'
Currently there are no comments in this discussion, be the first to comment!