Exam Name: | Certified Information Security Manager | ||
Exam Code: | CISM Dumps | ||
Vendor: | Isaca | Certification: | Isaca Certification |
Questions: | 793 Q&A's | Shared By: | quinn |
An anomaly-based intrusion detection system (IDS) operates by gathering data on:
When designing a disaster recovery plan (DRP), which of the following MUST be available in order to prioritize system restoration?
Which of the following BEST indicates that an organization has effectively tested its business continuity and disaster recovery plans within the stated recovery time objectives (RTOs)?