A few days after Fred launched his new website online, he discovers that the site is not accessible. Upon investigation, he learns that some of the hosting files on the server have been corrupted. Which of the following servers would Fred have to restore to get his site back up?
Which of the following terms refers to a client-server architecture that is merged with layered architecture?
Which of the following terms refers to the process of an organization to bring a system’s application, and data back to a previous state in a prescribed and acceptable time frame?
Which of the following refers to a central command and control facility responsible for carrying out recovery actions, coordinating response and resources, and assuring the coherence of operations of an organization?
Jon wanted to conduct a vulnerability assessment for his startup in order to safeguard it from any disaster in the future. The steps in vulnerability assessment are given below:
a) Assess the potential impact of the threat on the organization
b) Estimate the probability of occurrence of each threat
c) Assess the internal and external resources available to mitigate the identified threats
d) List the threats that may occur
In which order should Jon implement these steps?