Learn Business Continuity
Study Business Continuity using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
cc exam
cc exam
By: Faith Chris
SECURITY PRINCIPLES, RISK MANAGEMENT, SECURITY CONTROLS ...18Decks289Flashcards1Learner -
Rivstart A1+A2 (Svenska - German)
Rivstart A1+A2 (Svenska - German)
By: Eric van Lessen
Chapter 1 - food, Chapter 1 - introduce oneself, Chapter 1 - do you work here? ...29Decks693Flashcards13Learners -
Intro to IT
Intro to IT
By: Caira Felder
Acronym List, Data Hierarchy, Business Continuity ...8Decks68Flashcards1Learner -
CCSK
CCSK
By: UNKNOWN T
1. Cloud Computing Concepts and Architectures - DONE, 2. Governance and Enterprise risk management - DONE, 3. “Legal Issues, Contracts, and Electronic Discovery” - DONE ...15Decks542Flashcards2Learners -
Maryland State Exam
Maryland State Exam
By: Steven East
Hearing Procedures, Examination, Inspection Of Funeral Home and Funeral Service Businesses ...17Decks202Flashcards7Learners -
CCT
CCT
By: Casey Wilfling
01 - InfoSec Threats, 02 - Information Security Attacks, 03 - Information Security Fundamentals ...22Decks291Flashcards2Learners -
Red Cards Alevel Business
Red Cards Alevel Business
By: Phill Bond
Introduction Into Business, Business Objectives And Strategy Continued, External Influence ...14Decks159Flashcards1Learner -
Corporate Law
Corporate Law
By: Stacey Canavan
Module 5: Extra-Provincial Registration, Module 6: Post Incorporation Procedures: Resolutions, Module 7: Annual Corporate Business Matters ...5Decks138Flashcards3Learners -
MN10079: Macroeconomic environment
MN10079: Macroeconomic environment
By: Becky Harris
Lec 1 - GDP, Lec 2 - Jobs & Inflation, Lec 3 - Economic Growth ...9Decks268Flashcards1Learner -
CISM Exam Prep
CISM Exam Prep
By: Bryan Scott
Information Security Governance, Business Continuity & Security, Incident Response ...20Decks186Flashcards1Learner -
TEXAS INSURANCE ADJUSTER EXAM STUDY GUIDE
TEXAS INSURANCE ADJUSTER EXAM STUDY GUIDE
By: Quinnon Thomas
Section 1: Lesson 1 The role of an Insurance Adjuster Lesson 2: The Art and Practice of Adjusting, Section 1: Lesson 3 Claims Practices: The work of an Adjuster, Section 1: Lesson 4.1 Conducting Insurance Business in Texas ...26Decks340Flashcards26Learners -
Certified in Cybersecurity (content that's not in material's flashcards)
Certified in Cybersecurity (content that's not in material's flashcards)
By: Irick Barfield
Security Principles, Incident Response, Business Continuity and Disaster Recovery Concepts, Access Control Concepts ...5Decks51Flashcards3Learners -
IS Development and Implementation
IS Development and Implementation
By: Camilla Toft
Lecture 1 - Introduction, Lecture 2 - Implementation, Configuration (And Failures), Lecture 3 - History of ISD and Current practice and problems ...15Decks256Flashcards9Learners -
Business Studies GCSE Unit 5
Business Studies GCSE Unit 5
By: Christal Chothi
Chapter 19: Business finance - needs and sources, Chapter 19 continued2Decks60Flashcards1Learner -
CYBR 158
CYBR 158
By: Lateefat Alimi
MOD 7 - Physical Security, MOD 1 - Security Concepts and Governance, MOD 8 - Midterm ...15Decks378Flashcards2Learners -
Comptia IFT+
Comptia IFT+
By: Rhett Newman
2.5 compare and contrast storage types, 2.6 Compare and Contrast common computing devices and their purposes, 2.7 explain basic networking concepts ...22Decks306Flashcards33Learners -
Az-305 Dec 2023
Az-305 Dec 2023
By: Russell Lack
1. Design identity, governance, and monitoring solutions, 1.1: Design a solution for logging and monitoring, 1.2: Design authentication and authorization solutions ...29Decks442Flashcards33Learners -
CompTIA Security+ SY0-501 by Glen E. Clarke
CompTIA Security+ SY0-501 by Glen E. Clarke
By: Tánh Phạm
Ch19 - Understanding Monitoring and Auditing, Ch18 - 18.02 - Performing a Security Assessment, Ch18 - 18.01 - Understanding Types of Assessments ...48Decks593Flashcards29Learners -
Creativity, innovation and organisation
Creativity, innovation and organisation
By: Alice Wachtmeister
Conceptual Framework of Creativity, Innovation and Organisation, Business practice: theory and development, The process of change, creativity and innovation ...9Decks142Flashcards7Learners -
CC CYBERSECURITY CERTIFIED
CC CYBERSECURITY CERTIFIED
By: Lydell Gaines
Security Principles, Access Controls Concepts, Network Security ...6Decks126Flashcards2Learners -
VMware-VCTA
VMware-VCTA
By: Rafael Garcia
1 Introduction to Virtual Machines, 2 How Virtualization Works, 3 vSphere and the Software-Defined Data Center ...11Decks65Flashcards9Learners -
Business
Business
By: Carla Torres
Board of Directors and Officers (Corp Gov 16-20%), Operations Management (12-16%), SOX 2002 (Corp Gov- 16-20%) ...14Decks241Flashcards2Learners -
Business Managment
Business Managment
By: Flynn McNamara
Chapter 1 A - B, Chapter 1 C, Chapter 1 D ...23Decks142Flashcards1Learner -
CSCP
CSCP
By: Albert Kim
Certifications / Institutions, Customer service measures, Strategic importance of materials ...30Decks109Flashcards11Learners -
BEC
BEC
By: Abel Jay
B3-FINANCIAL MANAGEMENT-LEVERAGE, B3-FINANCIAL MANAGEMENT-WACC, B3-FINANCIAL MANAGEMENT-ASSET EFFECTIVENESS AND EFFICIENCY ...18Decks305Flashcards1Learner -
CISSP
CISSP
By: roland eschenburg
Software Development Security, Security Architecture And Design, Cryptography ...8Decks69Flashcards3Learners -
CISSP 2019 (tms005)
CISSP 2019 (tms005)
By: Tuck Meng Siew
Chapter 1– Security Governance through Principles and Policies, Chapter 2– Personnel Security and Risk Management Concepts, Chapter 3– Business Continuity Planning ...21Decks290Flashcards35Learners -
CISSP 2021
CISSP 2021
By: Will B
Domain 1 - Chapter 1 - Security Governance Through Principles & Policies, Cybrary - Domain 1, Domain 1 - Chapter 2 - Personnel Security and Risk Management Concepts ...6Decks162Flashcards2Learners -
C725 - Information Security and Assurance
C725 - Information Security and Assurance
By: S H
Chapter 2: Security Principles, Chapter 13: Software Development Security, Chapter 4: Governance and Risk Management ...11Decks254Flashcards2Learners -
Certified in Cybersecurity
Certified in Cybersecurity
By: Brittany Hullum
Chapter 1: Confidentiality, Integrity, Availability, and Non-repudiation, Chapter 2: Authentication and Authorization, Chapter 3: Privacy ...16Decks281Flashcards1Learner