The IT team of an organization is updating the policy and procedures regarding recovery controls. What are three examples of recovery controls? (Choose three.)
- firewall deployment
- server clustering
- database shadowing
- monitoring procedures
- backup/restore operations
- intrusion detection system
Explanation: Recovery security controls restore resources, functions, and capabilities back to a normal state after a violation of a security policy. Examples of recovery controls include backup/restore operations, fault tolerance drive systems, server clustering, and database shadowing.
Exam with this question: Cybersecurity Pathway Final Exam Answers
Please login or Register to submit your answer