This looks like a straightforward question about access control in the application. I think I'll start by considering the different options and thinking about how each one might work.
This looks like a straightforward question about contingency planning requirements. I'll review the options carefully and choose the one that best matches the description.
Okay, I think I've got this. Based on the extent of the disaster and the organization's recovery ability, the key steps would be to recover the critical functions to an alternate site, and then fully restore the system at that alternate site. The third step would be to recover the full system after a catastrophic loss.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Eun
4 months agoTarra
4 months agoUlysses
4 months agoInes
4 months agoLillian
4 months agoGail
5 months agoOlen
5 months agoMyong
5 months agoGlory
5 months agoCarrol
5 months agoNadine
5 months agoNoelia
5 months agoHector
5 months ago