Which of the following steps are performed by you for secure recovery based on the extent of the disaster and the organization’s recovery ability?

You work as a security manager for SoftTech Inc. You along with your team are doing the disaster
recovery for your project. Which of the following steps are performed by you for secure recovery
based on the extent of the disaster and the organization’s recovery ability? Each correct answer
represents a part of the solution. Choose three.

You work as a security manager for SoftTech Inc. You along with your team are doing the disaster
recovery for your project. Which of the following steps are performed by you for secure recovery
based on the extent of the disaster and the organization’s recovery ability? Each correct answer
represents a part of the solution. Choose three.

A.
Recover to an alternate site for critical functions

B.
Restore full system at an alternate operating site

C.
Restore full system after a catastrophic loss

D.
Recover at the primary operating site



Leave a Reply 0

Your email address will not be published. Required fields are marked *