Which of the following activities should occur after a business impact analysis (BIA)?
A. Identify threats to the IT environment
B. Identify critical applications
C. Analyze recovery options
D. Review the computing and user environment
A. Identify threats to the IT environment
B. Identify critical applications
C. Analyze recovery options
D. Review the computing and user environment