I think option B makes sense because it talks about meeting legislative requirements, which we discussed in class as crucial for managing information properly.
Okay, I think I've got this. The response plan should focus on isolating compromised machines, preventing further spread, and remediating the breach. Things like controlled folder access, application isolation, and machine isolation seem like they'd be important to include.
I'm a little confused by this question. Disaster recovery planning involves a lot of different elements, so it's hard to say which one is the "best" preparation. I might need to review my notes on business continuity and incident response to make sure I understand all the important components.
Okay, I've got this. The disadvantage of microcomputer-prepared files is that they are more vulnerable to unauthorized access and alteration. That's the clear answer here.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Dottie
4 months agoPhillip
4 months agoAn
4 months agoCassi
4 months agoGabriele
4 months agoVallie
5 months agoSilvana
5 months agoNancey
5 months agoDavida
5 months agoColton
5 months agoAllene
5 months agoNorah
5 months agoTheola
5 months agoDoug
5 months ago