1>A person can be a single point of failure. True False 2>The steps of a BCP are
ID: 3592435 • Letter: 1
Question
1>A person can be a single point of failure.
True
False
2>The steps of a BCP are the same as the phases of a BCP.
True
False
3>The more data you store, the more valuable that collection of data becomes.
True
False
4>Access controls protect data from unauthorized disclosure.
True
False
5>When node 1 is function, node 2 does nothing but check the status of node 1 regularly.
True
False
6>Manual methods are inferior to automated methods.
True
False
7>An employee who misses deadlines, shops online during work, and is routinely late is not a personnel asset because their behavior creates vulnerabilities in the company.
True
False
8>Backups protect data from unauthorized disclosure.
True
False
Explanation / Answer
1. A person can be a single point of failure.
Answer: True because A person can be a single point of failure in most of the cases like human errors, miss-matching the data from the original data etc.
2. The steps of a BCP are the same as the phases of a BCP.
Answer: False The steps of the Business continuity planning is different from the phases because the overview planning steps will comes under the business steps and actual procedures will comes under the phases so it varies for each steps in Business continuity planning.
3. The more data you store, the more valuable that collection of data becomes.
Answer: True if we are stroing more and huge data then the security will also became more effective and needed so their will be more valuble to secure the data and the collection of data will also became a major thing.
4. Access controls protect data from unauthorized disclosure.
Answer: True the access control is part of GRC that means Governance, Risk, and Compliance which is mainly used for security and giving security conditions of the applications and for the users who are working under application. so it also used for the protect data from unauthorized disclosure like user security.
5>.When node 1 is function, node 2 does nothing but check the status of node 1 regularly.
Answer: False node 2 does not only check the status of node 1 regularly but it is a function which work relie on the node 1 output.
6. Manual methods are inferior to automated methods.
Answer: True in order to automate a applications or a device we need to understand all the manual aspects of the application or device then we need to automate using the manual methods.
7. An employee who misses deadlines, shops online during work, and is routinely late is not a personnel asset because their behavior creates vulnerabilities in the company.
Answer: True Any culture in a company and in an big organisations we need to follow a decipline and professional protocols like we should not use any shopping and social network sites during the working hours. Because it will effect the company productivity. If we miss the deadline of the project also then their will be huge impact on the companies business.
8.Backups protect data from unauthorized disclosure.
answer: True It is good to keep a backup of the data. In future if we face any threats or hacked or a disaster occured we can recover it using the backup data. So Backups protect data from unauthorized disclosure.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.