Which resilience control could a company use to recover from a cyber attack?

Study for the WJEC Digital Technology Test. Learn with interactive quizzes, flashcards, and exam-style questions. Grasp digital concepts and prepare effectively for your test!

Multiple Choice

Which resilience control could a company use to recover from a cyber attack?

Explanation:
The main idea being tested is how a business maintains or quickly resumes operations after a cyber disruption. Arrangements for alternative premises, communication methods and facilities let the company keep functioning even if the main site or standard channels are compromised. For example, staff can work from a backup location, use different ways to stay in touch, and access essential tools without relying on the affected systems. This directly supports recovery by preserving continuity of service and reducing downtime, which is crucial after a cyber attack. While other options are valuable in resilience planning—such as backups for data restoration, what-if scenario planning for preparedness, and security audits to prevent incidents—they don’t by themselves ensure that a business can continue operating or quickly recover its functions in the midst of an attack.

The main idea being tested is how a business maintains or quickly resumes operations after a cyber disruption. Arrangements for alternative premises, communication methods and facilities let the company keep functioning even if the main site or standard channels are compromised. For example, staff can work from a backup location, use different ways to stay in touch, and access essential tools without relying on the affected systems. This directly supports recovery by preserving continuity of service and reducing downtime, which is crucial after a cyber attack.

While other options are valuable in resilience planning—such as backups for data restoration, what-if scenario planning for preparedness, and security audits to prevent incidents—they don’t by themselves ensure that a business can continue operating or quickly recover its functions in the midst of an attack.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy