Match each description to its plan by writing the description's number in the appropriate blank. Some descriptions may apply to two or more plans.
Plans:
Business continuity plan (BCP) 2, 9, and 10
Disaster recovery plan (DRP) 1, 3, and 4
Business impact analysis (BIA) 5 and 7
Incident response plan 8
Descriptions:
1. May be part of a BCP or referred to in a BCP (DRP)
2. Covers all functions of a business, including IT systems, facilities, and personnel (BCP)
3. Includes critical business functions (CBFs) (DRP)
4. Details emergency response and activities (DRP)
5. Generally includes interviews, surveys, or meetings to assess environment (BIA)
6. Includes the five Ws—who, what, where, when, and why—and one H—how (CIRT)
7. Includes maximum acceptable outages (MAOs) (BIA)
8. Often specifies hot, warm, and cold sites (Incident Response Plan)
9. Helps an organization continue to operate during and after a disruption (BCP)
10. Generally includes only mission-critical systems (BCP)
tructions:
Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.
Common encryption algorithms and methods:
Data Encryption Standard (DES)
Rivest, Shamir, and Adleman (RSA) encryption algorithm
Triple DES
Diffie-Hellman key exchange
International Data Encryption Algorithm (IDEA)
El Gamal encryption algorithm
Carlisle Adams and Stafford Taveres (CAST) algorithm
Elliptic curve cryptography (ECC)
Blowfish
Secure Sockets Layer (SSL)
Advanced Encryption Standard (AES)
Digital signature
Qualitative Risk Assessment
Single loss expectancy (SLE): Total loss expected from a single incident
Annual rate of occurrence (ARO): Number of times an incident is expected to occur in a year
Annual loss expectancy (ALE): Expected loss for a year ALE = SLE X ARO
Safeguard value: Cost of a safeguard or control
Scenario: Richman Investments