Which resilience activity could a company use to recover from a cyber attack?

Study for the WJEC Digital Technology Test. Learn with interactive quizzes, flashcards, and exam-style questions. Grasp digital concepts and prepare effectively for your test!

Multiple Choice

Which resilience activity could a company use to recover from a cyber attack?

Explanation:
When a cyber attack disrupts operations, the priority is to keep the business running by having a plan to continue core activities even if the primary site or systems are down. Arrangements for the use of alternative premises, communication methods and facilities provide a direct path to continuity: staff can relocate to another location, stay connected with customers and partners through different channels, and have the necessary infrastructure at a different site. This kind of setup is central to disaster recovery and business continuity, helping the organisation resume critical services quickly and recover smoothly. The other options focus on preventing or detecting incidents rather than enabling quick recovery after one occurs: deploying a new firewall strengthens defenses, implementing continuous monitoring improves detection and response, and auditing user access rights tightens governance and access control.

When a cyber attack disrupts operations, the priority is to keep the business running by having a plan to continue core activities even if the primary site or systems are down. Arrangements for the use of alternative premises, communication methods and facilities provide a direct path to continuity: staff can relocate to another location, stay connected with customers and partners through different channels, and have the necessary infrastructure at a different site. This kind of setup is central to disaster recovery and business continuity, helping the organisation resume critical services quickly and recover smoothly.

The other options focus on preventing or detecting incidents rather than enabling quick recovery after one occurs: deploying a new firewall strengthens defenses, implementing continuous monitoring improves detection and response, and auditing user access rights tightens governance and access control.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy