SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Business Continuity And Disaster Recovery
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Warm Site
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. How frequently should a company's insurance be reviewed?
Maximum tolerable downtime - Operational disruption and productivity - Financial considerations - Regulatory responsibilities - Reputation
It requires less resources and time
Annually
The primary and secondary data volumes are only a few milliseconds out of sync - so the replication is nearly real-time
3. Business Impact Analysis (BIA)
Consultants are experts in the field and know the necessary steps - questions to ask - and issues to look for - and they can also offer general reasonable advice. In-house employees know their company intimately and have a full understanding of how c
Since the software vendor provides its customers with only the compiled version of its applications - it's difficult for the customer to continue to use it if the vendor goes out of business. So the customer should set up a Software Escrow agreement
A functional analysis in which a team collects data through interviews - workshops - and documentary sources; documents business functions - activities - and transactions (maybe in a set of flow charts); develops a hierarchy of business functions; an
Done to ensure that the specific systems can actually perform adequately at the alternate offsite facility. some systems are moved to the alternate site and processing takes place. the results are compared with the regular processing that is done at
4. How should a team break down recovery strategies?
A functional analysis in which a team collects data through interviews - workshops - and documentary sources; documents business functions - activities - and transactions (maybe in a set of flow charts); develops a hierarchy of business functions; an
Representatives from each department or functional area come together to over the plan to ensure its accuracy
Damage assessment team - legal team - media relations team - network recovery team - relocation team - restoration team - salvage team - security team - telecommunications team
Business process recovery - Facility recovery - Supply and technology recovery - User environment recovery - Data recovery
5. Who should be involved in the Business Continuity and Disaster Recovery plans? In what part of the process?
Representatives from at least each of the following departments must be involved with not only the planning stages but also the testing and implementation stages: - Business Units - Senior Management - IT Department - Security Department - Communicat
Objective-to-task mapping - Resource-to-task mapping - Milestones - Budget estimates - Success factors - Deadlines
Object code - source code - libraries - patches and fixes
A document that outlines who should be contacted in the event of a disaster - in what order - and who is responsible for doing the calling
6. What are some reasons why BCPs become outdated?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
7. Checklist Test (Deckcheck Test)
Copies of the BCP are distributed to the different departments and functional areas for review
Responsibility: each individual involved should have their responsibilities spelled out in writing and the tasks should be assigned to the individual most situated to handle it - Authority: you need to know what leaders are going to step up to the pl
When it detects danger to human life - When it detects danger to state or national security - When it detects damage to the facility - When it detects damage to critical systems
Fortification of the facility in its construction materials - redundant servers and communications links - power lines coming in through different transformers - redundant vendor support - purchasing of insurance - purchasing of UPS and generators -
8. Damage Assessment Team
Determines the cause of the disaster - Determines the potential for further damage - Identifies the affected business functions and areas - Identifies the level of functionality for the critical resources - Identifies the resources that must be repla
Provides methods and procedures for dealing with longer-term outages and disaster.
Representatives from each department or functional area come together to over the plan to ensure its accuracy
Company A agrees to allow company B to use its facilities if company B is hit by a disaster - and vice versa. This is a cheaper way to go than the other offsite choices - but is not always the best choice because most environments are maxed out perta
9. What are the three types of disruptions that a facility can have and what does each mean?
There is more risk for the organization because replacement systems won't be available... that's why many organizations have moved to commercial off the shelf (COTS) products. they want to make sure replacement is possible
Business Resumption Plan - Continuity of Operations Plan (COOP) - IT Contingency Plan - Crisis Communications Plan - Cyber Incident Response Plan - Disaster Recovery Plan
It needs to ensure the safety of employees - It needs to ensure an adequate environment is provided (power - facility infrastructure - water - HVAC) - It needs to ensure that the necessary equipment and supplies are present and in working order - It
Nondisaster: a disruption in service due to a device malfunction or failure - Disaster: an event that causes the entire facility to be unusable for a day or longer - Catastrophe: a major disruption that destroys the facility altogether --> requires b
10. Role of the Business Continuity Coordinator
To resume business as quickly as possible - spending the least amount of money
Representatives from each department or functional area come together to over the plan to ensure its accuracy
Lead the BCP team and oversee the development - implementation - and testing of the continuity and disaster recovery plans... this person needs to have direct access to management and have the credibility and authority to carry out leadership tasks
Consultants are experts in the field and know the necessary steps - questions to ask - and issues to look for - and they can also offer general reasonable advice. In-house employees know their company intimately and have a full understanding of how c
11. What are the benefits of using the Differential or Incremental backup methods?
1. Initiation Phase: goal statements - overview of concepts - roles and teams definitions - task definitions 2. Activation Phase: notification steps - damage assessment - plan activation 3. Recovery Phase: move to alternate site - restore processes -
It requires less resources and time
When it is time for the company to move back into its original site or a new site
The plans that determine the steps needed to protect the company in the event that a senior executive retires - leaves the company - or is killed. also details the people who would step in and assume responsibility
12. Business Process
Management support
Business Resumption Plan - Continuity of Operations Plan (COOP) - IT Contingency Plan - Crisis Communications Plan - Cyber Incident Response Plan - Disaster Recovery Plan
A set of interrelated steps linked through specific decision activities to accomplish a specific task... business processes have starting and ending points and are repeatable
The primary and secondary data volumes are only a few milliseconds out of sync - so the replication is nearly real-time
13. What is the most critical part of establishing and maintaining a current continuity plan?
Loss in reputation and public confidence - Loss of competitive advantages - Increase in operational expenses - Violations of contract agreements - Violations of legal and regulatory requirements - Delayed income costs - Loss in revenue - Loss in pr
The employees who carry out the most critical functions of the company who must be put back to work first
Management support
Manmade: arsonist - terrorist - a simple mistake - Natural: tornadoes - floods - hurricanes - or earthquakes - Technical: data corruption - loss of power - device failure - or loss of a data communications line
14. When should a Damage Assessment Team change into Recovery mode?
Representatives from each department or functional area come together to over the plan to ensure its accuracy
Focuses on how to recover various IT mechanisms after a disaster. whereas a contingency plan is usually for nondisasters - a disaster recover plan is for disasters that require IT processing to take place at another facility
When it detects danger to human life - When it detects danger to state or national security - When it detects damage to the facility - When it detects damage to critical systems
Establishes personnel safety and evacuation procedures
15. What are some of the things you have to consider when it comes to supply and tech recovery?
Preventive mechanisms are put into place to try to reduce the possibility of the company experiencing a disaster and - if a disaster does hit - to lessen the amount of damage that will take place - Recovery strategies are processes on how to rescue t
Provides methods and procedures for dealing with longer-term outages and disaster.
Network and computer equipment - Voice and data communications resources - Human Resources - Transportation of equipment and personnel - Environment issues (HVAC) - Data and personnel security issues - Supplies (paper - forms - cabling - and so on) -
Before too many people come to their own conclusions about the company and begin to start false rumors
16. How do you determine how much coverage to obtain?
Base it off of the probability of the threat becoming real and the loss potential. the goal is to make sure the insurance coverage fills in the gap of what the current preventative countermeasures cannot protect against
Reduce the risk of financial loss by improving the company's ability to recover and restore operations
The estimated lifetime of a piece of equipment... calculated by the vendor of the equipment or a third party
A promise that a service will be fulfilled within a certain timeframe
17. Skeleton Crew
Committing fully to the BCP - Setting policy and goals - Making available the necessary funds and resources - Taking responsibility for the outcome of the development of the BCP - Appointing a team for the process
All employees who participate in operational and support functions - or their representatives - come together to practice executing the disaster recovery plan based on a specific scenario. the scenario is used to test the reaction of each operational
A method of transmitting data offsite - but it usually only includes moving the journal or transaction logs to the offsite facility - not the actual files. these logs contain the changes that have taken place to the individual files. Journaling is ef
The employees who carry out the most critical functions of the company who must be put back to work first
18. Hot Site
A facility that is leased or rented and is fully configured and ready to operate within a few hours... the only missing resources are usually the data - which will be retrieved from a backup site - and the people who are processing the data. The equi
Reduce the risk of financial loss by improving the company's ability to recover and restore operations
The business continuity process isn't integrated into the change management process - infrastructure and environment changes occur - reorganization of the company - layoffs - or mergers occur - changes in hardware - software - and applications occur
The client pays a monthly fee to retain the right to use the facility in a time of need and then incurs a large activation fee when the facility actually has to be used... most recovery site contracts do not promise to house the company in need at a
19. Synchronous Replication
The primary and secondary copies are always in sync - which provides true real-time duplication
Object code - source code - libraries - patches and fixes
Copies of the BCP are distributed to the different departments and functional areas for review
Manmade: arsonist - terrorist - a simple mistake - Natural: tornadoes - floods - hurricanes - or earthquakes - Technical: data corruption - loss of power - device failure - or loss of a data communications line
20. What is one of the big issues with VoIP and disaster recovery?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
21. Full-Interruption Test
Data are dynamically created and maintained as images on two or more identical disks. this method is used to ensure the availability of data and to provide a fault-tolerant solution by duplicating hardware and maintaining more than one copy of the in
The most intrusive test to regular operations and business productivity. the original site is shut down - and processing takes place at the alternate site. this test takes a lot of planning and coordination but it can reveal many holes in the plan. f
Hot Site - Warm Site - Colde Site
All data are backed up and saved to some type of storage media. backup and restoration processes are very simplistic and straightforward with this method
22. What are loss criteria that can be applied to individual threats that were identified in the BIA?
When it detects danger to human life - When it detects danger to state or national security - When it detects damage to the facility - When it detects damage to critical systems
Nondisaster: a disruption in service due to a device malfunction or failure - Disaster: an event that causes the entire facility to be unusable for a day or longer - Catastrophe: a major disruption that destroys the facility altogether --> requires b
Loss in reputation and public confidence - Loss of competitive advantages - Increase in operational expenses - Violations of contract agreements - Violations of legal and regulatory requirements - Delayed income costs - Loss in revenue - Loss in pr
Backup all the files that have changed since the last full or incremental backup. this process sets the archive bit to 0
23. Emergency Response Procedures
Prepared actions that are developed to help people in a crisis situation better cope with the disruption. Protection of life is of the utmost importance and should be dealt with first before looking to save material objects!
Representatives from each department or functional area come together to over the plan to ensure its accuracy
Since the software vendor provides its customers with only the compiled version of its applications - it's difficult for the customer to continue to use it if the vendor goes out of business. So the customer should set up a Software Escrow agreement
Objective-to-task mapping - Resource-to-task mapping - Milestones - Budget estimates - Success factors - Deadlines
24. Mean Time To Repair (MTTR)
Identifying regulatory and legal requirements that must be met - Identifying all possible vulnerabilities and threats - Estimating the possibilities of these threats and the loss potential - Performing a BIA - Outlining which departments - systems -
Establishes senior management and a headquarters after a disaster. outlines roles and authorities - orders of succession - and individual role tasks
Provides methods and procedures for dealing with longer-term outages and disaster.
An estimate of how long it will take to fix a piece of equipment and get it back into production
25. Asynchronous Replication
One person should be responsible... the authorities are the police department - security guards - fire department - emergency rescue - and management
A promise that a service will be fulfilled within a certain timeframe
The primary and secondary data volumes are only a few milliseconds out of sync - so the replication is nearly real-time
Manmade: arsonist - terrorist - a simple mistake - Natural: tornadoes - floods - hurricanes - or earthquakes - Technical: data corruption - loss of power - device failure - or loss of a data communications line
26. As a general rule of thumb - how far away should a backup facility be from the main facility?
Network and computer equipment - Voice and data communications resources - Human Resources - Transportation of equipment and personnel - Environment issues (HVAC) - Data and personnel security issues - Supplies (paper - forms - cabling - and so on) -
Includes internal and external communications structure and roles. identifies specific individuals who will communicate with external entities. contains predeveloped statements that are to be released
Contact the local authorities
It should be far enough away from the original site so one disaster does not take out both locations... alternate facilities should be at a bare minimum at least five miles away from the primary site - while 15 miles is recommended for most low-to-me
27. Disaster Recovery Plan
Use scenario-based exercises as a group to see what issues might crop up
Makes copies of files as they are modified and periodically transmits them to an offsite backup site. The transmission doesn't happen in real time but is carried out in batches
Focuses on how to recover various IT mechanisms after a disaster. whereas a contingency plan is usually for nondisasters - a disaster recover plan is for disasters that require IT processing to take place at another facility
Reduce the risk of financial loss by improving the company's ability to recover and restore operations
28. What are some appropriate and cost-effective preventative methods to better fortify a company from the impacts recognized in the BIA?
Typically a copy is stored at the BCP coordinator's home - and another copy is stored at the offsite facility... when they are stored offsite - they need to be stored in a way that provides just as much protection as the primary site would provide
Contact the local authorities
Fortification of the facility in its construction materials - redundant servers and communications links - power lines coming in through different transformers - redundant vendor support - purchasing of insurance - purchasing of UPS and generators -
Identifying regulatory and legal requirements that must be met - Identifying all possible vulnerabilities and threats - Estimating the possibilities of these threats and the loss potential - Performing a BIA - Outlining which departments - systems -
29. Simulation Test
Nondisaster: a disruption in service due to a device malfunction or failure - Disaster: an event that causes the entire facility to be unusable for a day or longer - Catastrophe: a major disruption that destroys the facility altogether --> requires b
All employees who participate in operational and support functions - or their representatives - come together to practice executing the disaster recovery plan based on a specific scenario. the scenario is used to test the reaction of each operational
Maximum tolerable downtime - Operational disruption and productivity - Financial considerations - Regulatory responsibilities - Reputation
The estimated lifetime of a piece of equipment... calculated by the vendor of the equipment or a third party
30. What are the three main types of leased or rented offsite facilities?
The estimated lifetime of a piece of equipment... calculated by the vendor of the equipment or a third party
Focuses on malware - hackers - intrusions - attacks - and other security issues. outlines procedures for incident response
Hot Site - Warm Site - Colde Site
A new type of coverage that insures losses caused by denial-of-service attacks - malware damages - hackers - electronic theft - privacy-related lawsuits and more
31. Executive Succession Planning
Manmade: arsonist - terrorist - a simple mistake - Natural: tornadoes - floods - hurricanes - or earthquakes - Technical: data corruption - loss of power - device failure - or loss of a data communications line
The most intrusive test to regular operations and business productivity. the original site is shut down - and processing takes place at the alternate site. this test takes a lot of planning and coordination but it can reveal many holes in the plan. f
After it has been tested
The plans that determine the steps needed to protect the company in the event that a senior executive retires - leaves the company - or is killed. also details the people who would step in and assume responsibility
32. Where does the Recovery Time Objective sit on a chart that keeps track of cost and time?
Establishes senior management and a headquarters after a disaster. outlines roles and authorities - orders of succession - and individual role tasks
Manmade: arsonist - terrorist - a simple mistake - Natural: tornadoes - floods - hurricanes - or earthquakes - Technical: data corruption - loss of power - device failure - or loss of a data communications line
Annually
At the intersection of the cost of disruption and the cost to recover
33. Maximum Tolerable Downtime (MTD)
The outage time that can be endured by a company
Focuses on how to re-create the necessary business processes that need to be reestablished instead of focusing on IT components
The least critical functions... it ensures that the critical operations of the company are not negatively affected
Maximum tolerable downtime - Operational disruption and productivity - Financial considerations - Regulatory responsibilities - Reputation
34. Disk Mirroring
Object code - source code - libraries - patches and fixes
It needs to ensure the safety of employees - It needs to ensure an adequate environment is provided (power - facility infrastructure - water - HVAC) - It needs to ensure that the necessary equipment and supplies are present and in working order - It
Each disk would have a corresponding mirrored disk that contains the exact same information
Company A agrees to allow company B to use its facilities if company B is hit by a disaster - and vice versa. This is a cheaper way to go than the other offsite choices - but is not always the best choice because most environments are maxed out perta
35. Tape Vaulting
The employees who carry out the most critical functions of the company who must be put back to work first
Identifying regulatory and legal requirements that must be met - Identifying all possible vulnerabilities and threats - Estimating the possibilities of these threats and the loss potential - Performing a BIA - Outlining which departments - systems -
A set of interrelated steps linked through specific decision activities to accomplish a specific task... business processes have starting and ending points and are repeatable
Backing up business data to tapes that are then manually transferred to an offsite facility by a courier or an employee... with automatic tape vaulting - the data are sent over a serial line to a backup tape system at the offsite facility. Electronic
36. What functions should be moved back first during the Reconstitution Phase?
The least critical functions... it ensures that the critical operations of the company are not negatively affected
Focuses on how to re-create the necessary business processes that need to be reestablished instead of focusing on IT components
Define essential business functions and supporting departments - Identify interdependencies between these functions and departments - Discover all possible disruptions that could affect the mechanisms necessary to allow these departments to function
The primary and secondary copies are always in sync - which provides true real-time duplication
37. What should the BCP team do in the recovery strategy stage?
Responsible for getting the alternate site into a working and functioning environment. Needs to know how to install OSes - configure workstations and servers - string wiring and cabling - set up the network and configure networking services - and ins
A promise that a service will be fulfilled within a certain timeframe
Prepared actions that are developed to help people in a crisis situation better cope with the disruption. Protection of life is of the utmost importance and should be dealt with first before looking to save material objects!
It has to figure out what the company needs to do to actually recover the items it has identified as being so important to the organization overall... the BIA provides the footprint
38. NIST Steps for Business Continuity
Present it to management for written approval
The primary and secondary copies are always in sync - which provides true real-time duplication
1. Initiation Phase: goal statements - overview of concepts - roles and teams definitions - task definitions 2. Activation Phase: notification steps - damage assessment - plan activation 3. Recovery Phase: move to alternate site - restore processes -
1. Develop the continuity planning policy statement 2. Conduct the business impact analysis (BIA) 3. Identify preventive controls 4. Develop recovery strategies 5. Develop the contingency plan 6. Test the plan and conduct training and exercises 7. Ma
39. How are offsite backup facility contracts usually established?
Preventive mechanisms are put into place to try to reduce the possibility of the company experiencing a disaster and - if a disaster does hit - to lessen the amount of damage that will take place - Recovery strategies are processes on how to rescue t
The client pays a monthly fee to retain the right to use the facility in a time of need and then incurs a large activation fee when the facility actually has to be used... most recovery site contracts do not promise to house the company in need at a
The outage time that can be endured by a company
Responsible for getting the alternate site into a working and functioning environment. Needs to know how to install OSes - configure workstations and servers - string wiring and cabling - set up the network and configure networking services - and ins
40. Cyberinsurance
Manmade: arsonist - terrorist - a simple mistake - Natural: tornadoes - floods - hurricanes - or earthquakes - Technical: data corruption - loss of power - device failure - or loss of a data communications line
Objective-to-task mapping - Resource-to-task mapping - Milestones - Budget estimates - Success factors - Deadlines
Backing up business data to tapes that are then manually transferred to an offsite facility by a courier or an employee... with automatic tape vaulting - the data are sent over a serial line to a backup tape system at the offsite facility. Electronic
A new type of coverage that insures losses caused by denial-of-service attacks - malware damages - hackers - electronic theft - privacy-related lawsuits and more
41. If a company loses computing capabilities for a week - what is the chance they will go out of business (on average)?
Done to ensure that the specific systems can actually perform adequately at the alternate offsite facility. some systems are moved to the alternate site and processing takes place. the results are compared with the regular processing that is done at
One person should be responsible... the authorities are the police department - security guards - fire department - emergency rescue - and management
65%
The file system sets the archive bit of the file to 1 when a file is modified or created
42. Where should the business continuity and disaster recovery plans be stored when they're completed?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. What is one of the best ways to work through the details of a BIA?
Representatives from at least each of the following departments must be involved with not only the planning stages but also the testing and implementation stages: - Business Units - Senior Management - IT Department - Security Department - Communicat
Base it off of the probability of the threat becoming real and the loss potential. the goal is to make sure the insurance coverage fills in the gap of what the current preventative countermeasures cannot protect against
Use scenario-based exercises as a group to see what issues might crop up
The business continuity process isn't integrated into the change management process - infrastructure and environment changes occur - reorganization of the company - layoffs - or mergers occur - changes in hardware - software - and applications occur
44. What is the main goal of business continuity?
To resume business as quickly as possible - spending the least amount of money
Responsible for starting the recovery of the original site. Needs to know how to install OSes - configure workstations and servers - string wiring and cabling - set up the network and configure networking services - and install equipment and applicat
Damage assessment team - legal team - media relations team - network recovery team - relocation team - restoration team - salvage team - security team - telecommunications team
Computer systems - Personnel - Procedures - Tasks - Supplies - Vendor support
45. Full Backup
Annually
All data are backed up and saved to some type of storage media. backup and restoration processes are very simplistic and straightforward with this method
It has to figure out what the company needs to do to actually recover the items it has identified as being so important to the organization overall... the BIA provides the footprint
Consultants are experts in the field and know the necessary steps - questions to ask - and issues to look for - and they can also offer general reasonable advice. In-house employees know their company intimately and have a full understanding of how c
46. Once the project plan is completed - what should be done before further steps are taken?
Present it to management for written approval
1. Select individuals to interview for data gathering 2. Create data-gathering techniques (surveys - questionnaires - qualitative and quantitative approaches) 3. Identify the company's critical business functions 4. Identify the resources these funct
Lead the BCP team and oversee the development - implementation - and testing of the continuity and disaster recovery plans... this person needs to have direct access to management and have the credibility and authority to carry out leadership tasks
When it is time for the company to move back into its original site or a new site
47. Especially in a software development environment - what should be backed up?
Object code - source code - libraries - patches and fixes
Maximum tolerable downtime - Operational disruption and productivity - Financial considerations - Regulatory responsibilities - Reputation
The primary and secondary data volumes are only a few milliseconds out of sync - so the replication is nearly real-time
Manmade: arsonist - terrorist - a simple mistake - Natural: tornadoes - floods - hurricanes - or earthquakes - Technical: data corruption - loss of power - device failure - or loss of a data communications line
48. Who should be responsible for notifying the appropriate authorities and who would those authorities be?
Loss in reputation and public confidence - Loss of competitive advantages - Increase in operational expenses - Violations of contract agreements - Violations of legal and regulatory requirements - Delayed income costs - Loss in revenue - Loss in pr
One person should be responsible... the authorities are the police department - security guards - fire department - emergency rescue - and management
1. Develop the continuity planning policy statement 2. Conduct the business impact analysis (BIA) 3. Identify preventive controls 4. Develop recovery strategies 5. Develop the contingency plan 6. Test the plan and conduct training and exercises 7. Ma
Typically a copy is stored at the BCP coordinator's home - and another copy is stored at the offsite facility... when they are stored offsite - they need to be stored in a way that provides just as much protection as the primary site would provide
49. What are the three main types of threats?
All employees who participate in operational and support functions - or their representatives - come together to practice executing the disaster recovery plan based on a specific scenario. the scenario is used to test the reaction of each operational
Establishes personnel safety and evacuation procedures
The file system sets the archive bit of the file to 1 when a file is modified or created
Manmade: arsonist - terrorist - a simple mistake - Natural: tornadoes - floods - hurricanes - or earthquakes - Technical: data corruption - loss of power - device failure - or loss of a data communications line
50. Occupant Emergency Plan
Representatives from at least each of the following departments must be involved with not only the planning stages but also the testing and implementation stages: - Business Units - Senior Management - IT Department - Security Department - Communicat
Establishes personnel safety and evacuation procedures
Business process recovery - Facility recovery - Supply and technology recovery - User environment recovery - Data recovery
A functional analysis in which a team collects data through interviews - workshops - and documentary sources; documents business functions - activities - and transactions (maybe in a set of flow charts); develops a hierarchy of business functions; an
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests