You work as a security manager for SoftTech Inc. You along with your team are doing the disaster
recovery for your project. Which of the following steps are performed by you for secure recovery
based on the extent of the disaster and the organization’s recovery ability? Each correct answer
represents a part of the solution. Choose three.
A.
Recover to an alternate site for critical functions
B.
Restore full system at an alternate operating site
C.
Restore full system after a catastrophic loss
D.
Recover at the primary operating site