Page 1515 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1515

designs the procedures and mechanisms to mitigate risks that were
                    deemed unacceptable during the strategy development phase.

               17.  D. This is an example of alternative systems. Redundant

                    communications circuits provide backup links that may be used
                    when the primary circuits are unavailable.

              18.  C. Disaster recovery plans pick up where business continuity plans
                    leave off. After a disaster strikes and the business is interrupted,
                    the disaster recovery plan guides response teams in their efforts to
                    quickly restore business operations to normal levels.


               19.  A. The single loss expectancy (SLE) is computed as the product of
                    the asset value (AV) and the exposure factor (EF). The other
                    formulas displayed here do not accurately reflect this calculation.

              20.  C. You should strive to have the highest-ranking person possible
                    sign the BCP’s statement of importance. Of the choices given, the
                    chief executive officer is the highest ranking.
   1510   1511   1512   1513   1514   1515   1516   1517   1518   1519   1520