What is the name of the well-defined plan that details the processes we would use to recover the IT infrastructure after it was destroyed by a hurricane?
B. Disaster recovery plan (DRP).
What policy should all network users fully understand and abide by to prevent viruses and malware from getting onto the network?
C. Acceptable use policy (AUP).
What term describes the inadvertent admission of an intruder through a locked door that an authorized key holder has opened?
What term describes the act of enticing users to provide private or confidential information via email or a website?
C. Single point of failure (SPOF).
What term describes a system, function, or department that may fail and cause other systems, functions, or departments to fail?
B. Peer-to-peer networking (P2P).
C. Quid pro quo.
D. Single point of failure (SPOF).