Page 1515 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1515
designs the procedures and mechanisms to mitigate risks that were
deemed unacceptable during the strategy development phase.
17. D. This is an example of alternative systems. Redundant
communications circuits provide backup links that may be used
when the primary circuits are unavailable.
18. C. Disaster recovery plans pick up where business continuity plans
leave off. After a disaster strikes and the business is interrupted,
the disaster recovery plan guides response teams in their efforts to
quickly restore business operations to normal levels.
19. A. The single loss expectancy (SLE) is computed as the product of
the asset value (AV) and the exposure factor (EF). The other
formulas displayed here do not accurately reflect this calculation.
20. C. You should strive to have the highest-ranking person possible
sign the BCP’s statement of importance. Of the choices given, the
chief executive officer is the highest ranking.

