{"id":159,"date":"2021-01-17T05:19:56","date_gmt":"2021-01-16T17:49:17","guid":{"rendered":"https:\/\/exampracticetests.com\/ISC\/CISSP\/certified-information-systems-security-professional-cissp-question152\/"},"modified":"2021-01-17T05:23:52","modified_gmt":"2021-01-17T05:23:52","slug":"certified-information-systems-security-professional-cissp-question152","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/ISC\/CISSP\/certified-information-systems-security-professional-cissp-question152\/","title":{"rendered":"Certified Information Systems Security Professional &#8211; CISSP &#8211; Question152"},"content":{"rendered":"<div class=\"question\">Recovery strategies of a Disaster Recovery planning (DRIP) MUST be aligned with which of the following? <br \/><strong><br \/>A.<\/strong> Hardware and software compatibility issues <br \/><strong>B.<\/strong> Applications\u2019 critically and downtime tolerance <br \/><strong>C.<\/strong> Budget constraints and requirements <br \/><strong>D.<\/strong> Cost\/benefit analysis and business objectives<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>D<\/strong><\/div>\n<p><strong>Explanation:<\/strong> <\/p>\n<div class=\"explanation\">\nReference: <a href=\"http:\/\/www.pearsonitcertification.com\/articles\/article.aspx?p=1329710&#038;seqNum=3\" title=\"External link\" rel=\"nofollow noopener\" target=\"_blank\">http:\/\/www.pearsonitcertification.com\/articles\/article.aspx?p=13297&#8230;<\/a><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Recovery strategies of a Disaster Recovery planning (DRIP) MUST be aligned with which of the following? A. Hardware and software compatibility issues B. Applications\u2019 critically and downtime tolerance C. Budget constraints and requirements D. Cost\/benefit analysis and business objectives Show Answer Hide Answer Correct Answer: D Explanation: Reference: http:\/\/www.pearsonitcertification.com\/articles\/article.aspx?p=13297&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,391,155],"class_list":["post-159","post","type-post","status-publish","format-standard","hentry","category-certified-information-systems-security-professional-cissp","tag-certified-information-systems-security-professional-cissp","tag-choices","tag-question-152"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/posts\/159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/comments?post=159"}],"version-history":[{"count":1,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/posts\/159\/revisions"}],"predecessor-version":[{"id":549,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/posts\/159\/revisions\/549"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/media?parent=159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/categories?post=159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/tags?post=159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}