Which of the following steps are performed by you for secure recovery based on the extent of the disaster and the organization’s recovery ability?

You work as a security manager for SoftTech Inc. You along with your team are doing the disaster
recovery for your project. Which of the following steps are performed by you for secure recovery
based on the extent of the disaster and the organization’s recovery ability?
Each correct answer represents a part of the solution. Choose three.

You work as a security manager for SoftTech Inc. You along with your team are doing the disaster
recovery for your project. Which of the following steps are performed by you for secure recovery
based on the extent of the disaster and the organization’s recovery ability?
Each correct answer represents a part of the solution. Choose three.

A.
Recover to an alternate site for critical functions

B.
Restore full system at an alternate operating site

C.
Restore full system after a catastrophic loss

D.
Recover at the primary operating site

Explanation:
C

The steps performed for secure recovery in disasters is based on the extent of the disaster and the
organization’s recovery ability. The steps performed for secure recovery are as follows .
Recover at the primary operating site.
Recover to an alternate site for critical functions.
Restore full system after a catastrophic loss.
Answer option B is incorrect. This is not a valid answer for this Question.

CISM Review Manual 2010, Contents. “Incident Management and Response”



Leave a Reply 0

Your email address will not be published. Required fields are marked *