Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IIA-ACCA Exam - Topic 7 Question 36 Discussion

Actual exam question for IIA's IIA-ACCA exam
Question #: 36
Topic #: 7
[All IIA-ACCA Questions]

According to IIA guidance, which of the following is the correct order to conduct a business impact analysis (BIA) for the potential loss of an organization's network services''

1. identify resources and partners to provide required recovery services

2. Identify the business processes supporting the network functionality

3. Obtain approval of the BIA from the operating managers relative to their areas of responsibility

4. Identify the business impact if the network services cannot be performed

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Winfred
5 months ago
Is it really that straightforward? I have my doubts!
upvoted 0 times
...
Ling
5 months ago
I thought it was A at first, but B is definitely better.
upvoted 0 times
...
Lashaunda
5 months ago
Wait, why would you identify impacts before partners? Seems off.
upvoted 0 times
...
Tambra
5 months ago
Totally agree, B makes the most sense.
upvoted 0 times
...
Della
6 months ago
B is the right order, starts with business processes!
upvoted 0 times
...
Tamra
6 months ago
I could be wrong, but I think we need to identify the impact of losing network services before we look at recovery options. That makes sense to me.
upvoted 0 times
...
Noel
6 months ago
I feel like the order is crucial here. I practiced a similar question, and I think it was about identifying impacts before recovery services.
upvoted 0 times
...
Amie
6 months ago
I'm not entirely sure, but I remember something about getting approval from managers being important. Maybe that comes later?
upvoted 0 times
...
Lynda
6 months ago
I think we start by identifying the business processes first, right? That seems logical before assessing impacts.
upvoted 0 times
...
Jaleesa
6 months ago
Social engineering seems like the most impactful option here. Manipulating employees to bypass security protocols is a classic tactic.
upvoted 0 times
...
Jill
6 months ago
I've got this! The customer needs 60 TB of storage, and each disk is 600 GB. So we just need to divide 60,000 GB by 600 GB to get the number of disks required.
upvoted 0 times
...
Kenda
6 months ago
Okay, let me see. I know aggregations have to do with combining multiple links, but I'm not sure about the specifics of their behavior. I'll have to carefully consider each option.
upvoted 0 times
...
Chauncey
6 months ago
This question seems straightforward, but I want to double-check the protocols to make sure I don't miss anything.
upvoted 0 times
...

Save Cancel