List of questions
Related questions
Question 876 - CISSP discussion
What protocol is often used between gateway hosts on the Internet' To control the scope of a Business Continuity Management (BCM) system, a security practitioner should identify which of the following?
A.
Size, nature, and complexity of the organization
B.
Business needs of the security organization
C.
All possible risks
D.
Adaptation model for future recovery planning
Your answer:
0 comments
Sorted by
Leave a comment first