1. What is a disaster recovery firm? When and why would you establish a contract with them?
2. What is online backup?
3. People who attempt intrusion can be classified into four different categories. Describe them.
4. There are many components in a typical security policy. Describe three important components.