7. Preparing Disaster Recovery and Contingency Plan
7. Preparing Disaster Recovery and Contingency Plan
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 1 of 32
December 2024
Addis Ababa, Ethiopia
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 2 of 32
Table of Contents
Contents
Acknowledgement .......................................................................................................................... 3
Acronyms ........................................................................................................................................ 4
Introduction to the Module ............................................................................................................. 5
Unit One: Impact and threat of system on business continuity ...................................................... 6
A. Analyzing business goals and objectives ............................................................................. 7
1.2.2 Risk assessment .............................................................................................................. 10
b. Identifying threats .............................................................................................................. 13
c. Identifying vulnerabilities .................................................................................................. 13
d. Analyzing internal controls ................................................................................................ 14
e. Determining the likelihood ................................................................................................ 14
f. Assessing the impact a threat ............................................................................................. 15
g. Prioritizing the risks ........................................................................................................... 15
Self-check 1.1 ............................................................................................................................... 16
2.1. Evaluating prevention and recovery options ...................................................................... 20
a. Prevention Strategies........................................................................................................ 20
b. Recovery Planning............................................................................................................ 20
c. Testing and Validation ..................................................................................................... 20
d. Continuous Improvement ................................................................................................... 21
Self-check 1.1 ............................................................................................................................... 27
Operation Sheet 2.1 ..................................................................................................................... 30
Developers Profile ........................................................................................................................ 31
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 3 of 32
Acknowledgement
The Ministry of Labor and Skills (MoLS) would like to express its gratitude and appreciation to
the teachers/trainers and experts from regional TVT bureaus, TVT colleges, and industry
practitioners who contributed their expertise and experience in preparing this training module.
The ministry also expresses its deepest gratitude to the ………………………………. for its
invaluable support and collaboration in the module preparation. It is also thankful to MoLS staff
members who coordinated the preparation and reviewing process of this training module.
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 4 of 32
Acronyms
DRCP This Disaster Recovery and Contingency Plan
DRP Disaster Recovery Plan
RPO Recovery Point Objectives
ACP Assessing Contingency Plans
RPOs Define Recovery Point Objectives
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 5 of 32
Module Instruction
For effective use these modules trainees are expected to follow the following module instruction:
1. Read the information written in each unit
2. Accomplish the Self-checks at the end of each unit
3. Perform Operation Sheets which were provided at the end of units
4. Do the “LAP test” giver at the end of each unit and
5. Read the identified reference book for Examples and exercise
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 6 of 32
This unit will also assist you to attain the learning outcomes stated in the cover page.
Specifically, upon completion of this Training Module, you will be able to:
Identify threats
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 7 of 32
The first step is to review business goals and objectives and determine how they align with
mission, vision, and values. What are the main outcomes and benefits that deliver to customers,
stakeholders, and partners? How do measure the performance and success? How do differentiate
the organization from your competitors? These questions will help you identify the high-level
functions that drive business value and purpose.
B. Mapping out business processes and dependencies
The next step is to map out the business processes that support the goals and objectives and
identify the dependencies and interrelationships among them. A business process is a set of
activities that transforms inputs into outputs, such as creating a product, delivering a service, or
managing a project. A dependency is a condition or requirement that a process relies on to
function, such as people, equipment, information, or suppliers. Use tools such as flowcharts,
diagrams, or matrices to visualize business processes and dependencies and identify potential
gaps, bottlenecks, or risks.
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 8 of 32
restored. Use tools such as ranking, scoring, or weighting to assign priority levels to your
business functions and categorize them into critical, essential, important, or minor. You should
also consider factors such as recovery time, recovery cost, recovery resources, or recovery
alternatives.
E. Documenting and communicate critical business functions
The final step is to document and communicate your critical business functions and their priority
levels in your continuity plan. You should include details such as the description, purpose, scope,
owner, stakeholders, inputs, outputs, dependencies, risks, impacts, likelihoods, recovery
objectives, recovery strategies, recovery actions, and recovery responsibilities of each critical
business function. You should also communicate your critical business functions and their
priority levels to your employees, customers, suppliers, and other relevant parties and ensure that
they understand their roles and expectations in the event of a disruption.
By following these steps, you can identify your critical business functions and prioritize them in
your continuity plan. This will help you protect your business value and purpose, meet your
customer needs and expectations, and comply with your legal and regulatory obligations in the
face of any disruption.
1.2 Assessing potential business risk and threats impacts on IT
This Disaster Recovery and Contingency Plan (DRCP) outline the strategies and procedures to
minimize disruption and expedite recovery in the event of a network disaster. The primary
objectives of this plan are to:
Protect Critical Data: Safeguard essential data and prevent data loss.
Minimize Downtime: Reduce the duration of network outages and service interruptions.
Ensure Business Continuity: Maintain operational continuity and minimize business
impact.
Facilitate Swift Recovery: Streamline the recovery process and restore network
functionality efficiently.
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 9 of 32
Business continuity and disaster recovery have different overarching purpose. Business
continuity aims to maintain the essential functions of an organization during and after a
disruption, ensuring the continuation of critical processes and services. On the other hand,
disaster recovery is primarily concerned with minimizing the downtime and data loss resulting
from an IT-related disaster or failure. While their objectives may overlap to some extent, their
ultimate purposes differ.
This section identifies potential risks that could impact the network infrastructure, including:
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 10 of 32
IT risk assessments help organizations understand and manage potential threats to their
information systems, networks, and data. They can also help inform decision-makers about how
to implement risk management strategies.
IT risk assessments are a crucial part of any successful security program. Risk assessments allow
you to see how your organization’s risks and vulnerabilities are changing over time, so decision-
makers can put appropriate measures and safeguards in place to respond to risks appropriately.
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 11 of 32
The first step in a risk assessment is to make sure that you have a comprehensive list of your
informational assets. It’s important to remember that different roles and different departments
will have different perspectives on what the most important assets are, so you should get input
from more than one source here. The most important information asset for salespeople might be
your company’s CRM. At the same time, IT likely sees the servers they maintain as a higher
priority, while HR’s most important information asset is confidential employee information.
Once you have identified all of your information assets and key stakeholders within all
departments, you’ll need to classify these data assets based on their sensitivity level as well as
the strategic importance of the asset to the organization. To get accurate and complete
information, you’ll need to talk to the administrators of all major systems across all
departments.
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 12 of 32
Once you have your data classified, you can zero in on the most sensitive data and see how it is
being handled.
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 13 of 32
b. Identifying threats
When thinking about threats to data security, hackers are usually top of mind, but threats to your
business’s information security come in many different forms. hackers exploiting weaknesses in
a business’ firewalls or website security programs has been very common. You need to take into
account many different threat types when compiling a list of all the unique threats your business
faces.
For example, you also have to take into account not just malicious human interference, but also
accidental human interference, such as employees accidentally deleting information or clicking
on a malware link. Depending on the quality of your hardware and your information systems,
you might also need to account for the risk of system failure.
Finally, things such as natural disasters and power failures can wreak as much havoc as humans
can, so you need to account for any of those kinds of threats as well. After you’ve completed this
step, you should have a thorough list of the threats to your assets.
c. Identifying vulnerabilities
Vulnerability is a weakness in your system or processes that might lead to a breach of
information security. For example, if your company stores customers’ credit card data but isn’t
encrypting it or testing that encryption process to ensure it’s working properly, that’s a
significant vulnerability. Allowing weak passwords, failing to install the most recent security
patches on software, and failing to restrict user access to sensitive information are behaviors that
will leave your business’s sensitive information vulnerable to attack.
Another vulnerability you may face during the coronavirus health crisis is the lack of staff.
Security controls are at risk of not being performed as IT security staff are working remotely or
worse, sick themselves.
You can find vulnerabilities through audits, penetration testing, security analyses, automated
vulnerability scanning tools, or the NIST vulnerability database.
It’s also important to consider potential physical vulnerabilities. For example, suppose your
employees work with hard copies of sensitive information or use company electronics outside of
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 14 of 32
the office. In that case, this can lead to the misuse of information, just like vulnerabilities in your
software and electronic systems
Controls can be technical, such as computer software, encryption, or tools for detecting
hackers or other intrusions, or non-technical, such as security policies or physical controls.
Controls can also be broken down into preventive or detective controls, meaning that they
either prevent incidents or detect when an incident is occurring and alert you.
Creating effective controls requires experience and skills. Suppose your firm does not have
security and compliance subject matter experts on staff. In that case, it is crucial to seek out
assistance from professional services firms that have deep expertise in addressing IT security
issues.
So, if, for example, a core application you use to run your business is out-of-date and there’s
no process for regularly checking for updates and installing them, the likelihood of an
incident involving that system would probably be considered high.
On the other hand, if you handle a large volume of personal health information, have
automated systems for encrypting and anonymizing it, and regularly test and check the
effectiveness of those systems, the likelihood of an incident could be considered low. You
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 15 of 32
will need to use your knowledge of the vulnerabilities and the implementation of the controls
within your organization to make this determination.
1. The mission of the system, including the processes implemented by the system
2. The criticality of the system is determined by its value and the value of the data to the
organization
3. The sensitivity of the system and its data
If possible, you should consider both the quantitative and qualitative impacts of an incident to get
the full picture. Depending on the three factors above, you can determine whether a threat would
have a high, medium, or low impact on your organization. Taken together with how likely an
incident is to occur, this impact analysis will help you to prioritize these risks in the next step.
Prioritizing security risks will help you determine which ones warrant immediate action, where
you should invest your time and resources, and which risks you can address at a later time.
For this step, it might help to utilize a simple risk matrix that helps you use the information you
already have about each vulnerability/threat pair you’ve identified and plot it on the matrix.
Risks that are both likely to happen and would have severe consequences would be mapped as a
high priority, while risks that are unlikely to happen and would have marginal consequences
would be mapped as the lowest priority, with everything else falling somewhere in between.
Make a risk matrix as simple or as complex as is helpful to you. If you’re a large organization
with a lot of risks competing with each other for time and attention, a more in-depth 5×5 risk
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 16 of 32
matrix will likely be helpful; smaller organizations with fewer risks to prioritize can probably
utilize a simple 3×3 matrix and still get the same benefit.
Self-check 1.1
Directions: Answer all the questions listed below.
Part I: Say true or false
----------------1. A Business Impact Analysis (BIA) helps identify critical systems and their
impact on business operations in the event of a disruption.
----------------2. Recovery Time Objective (RTO) defines the maximum amount of data loss that
can be tolerated before significant business impact occurs.
----------------3. Redundancy measures, such as redundant servers and network connections, are
not crucial for effective disaster recovery.
----------------4. Regular testing of the disaster recovery plan is unnecessary as long as the plan is
well-documented.
----------------5. A cold site is a fully equipped and operational facility that can be quickly
brought online in the event of a disaster.
----------------6. Cyberattacks are a significant threat to network services and should be
considered in a comprehensive risk assessment.
---------------7. Employee training on disaster recovery procedures is not essential for the success
of the plan.
----------------8. Cloud computing can offer cost-effective and scalable solutions for data backup
and disaster recovery.
----------------9. Relying solely on physical security measures is sufficient for protecting network
infrastructure from all threats.
---------------10. A well-defined disaster recovery plan helps minimize downtime, reduce
financial losses, and maintain business continuity.
Answer
1. True
2. False: RTO defines the timeframe for restoring systems, not data loss.
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 17 of 32
3. False: Redundancy is crucial for minimizing single points of failure and ensuring
continued operations.
4. False: Regular testing is essential to identify and address any weaknesses in the plan.
5. False: A cold site is a basic facility with minimal equipment that requires time to be
made operational.
6. True
7. Employee training is crucial to ensure that everyone understands their roles and
responsibilities in the event of a disaster.
8. True
9. False: Physical security is important, but it's only one aspect of a comprehensive
security strategy.
10. True
Risk Assessment
2. ______________ define the maximum amount of data loss that can be tolerated in the
event of a disaster.
3. ______________ define the timeframe within which critical systems and processes must
be restored after a disaster.
Redundancy
5. A ______________ site is a fully equipped and operational facility that can be quickly
brought online in the event of a disaster.
Hot Site
6. Regular ______________ of the disaster recovery plan are essential to ensure its
effectiveness.
Testing
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 18 of 32
7. ______________ is crucial for protecting network infrastructure from cyber attacks and
unauthorized access.
Network Security
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 19 of 32
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
Evaluating prevention and recovery options
This unit will also assist you to attain the learning outcomes stated in the cover page.
Specifically, upon completion of this Training Module, you will be able to:
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 20 of 32
Redundancy: Implement failover systems such as backup servers and redundant network
paths to avoid single points of failure.
Monitoring Tools: Use advanced network monitoring tools to detect anomalies and
predict issues before they escalate.
Security Measures: Strengthen firewalls, intrusion detection systems, and endpoint
protection to prevent cyber attacks.
Regular Maintenance: Schedule routine updates and inspections for hardware and
software to ensure reliability.
b. Recovery Planning
Disaster Recovery Plan (DRP): Develop a detailed plan for restoring network services,
specifying roles, processes, and timelines.
Backups: Ensure regular data and configuration backups, stored securely and easily
accessible during a recovery.
Alternative Solutions: Set up temporary solutions (e.g., mobile networks or cloud
services) to maintain service during recovery.
Regularly test prevention and recovery mechanisms, such as simulating outages and
running penetration tests.
Evaluate the effectiveness of failover systems and recovery speed during mock drills.
Document lessons learned from tests to refine strategies.
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 21 of 32
d. Continuous Improvement
Reviewing current operational procedures for risk safeguards and contingency plans involves a
systematic approach to evaluate their effectiveness, identify gaps, and recommend improvements.
Define Objectives: Clarify what you aim to achieve with the review, such as identifying
vulnerabilities or ensuring compliance with regulations.
Determine Scope: Decide which areas, operations, or risks will be reviewed. Include key risk
safeguards and contingency plans.
Collect Policies and Procedures: Obtain all relevant documents, including risk management
policies, operational procedures, and contingency plans.
Understand Context: Learn about the organization's risk appetite, key threats, and critical
operations.
Review Past Incidents: Analyze reports from previous incidents or audits to identify recurring
issues.
Interview Staff: Discuss processes with those responsible for implementing safeguards and
contingency plans.
Collaborate with Experts: Engage risk managers, compliance officers, and IT specialists for
technical insights.
d. Analyzing Safeguards
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 22 of 32
Test Controls: Perform drills or simulations to assess the effectiveness of physical, procedural,
and technical safeguards.
Check Alignment: Ensure safeguards align with organizational goals and industry standards.
Review Plan Content: Verify that contingency plans address key risks, identify roles, and
provide clear instructions.
Check Accessibility: Confirm that the plans are readily available and understood by relevant
personnel.
Conduct Testing: Simulate scenarios to test the functionality and practicality of contingency
measures.
Evaluate Recovery Times: Ensure the plans meet recovery time objectives (RTOs) and recovery
point objectives (RPOs).
Analyze Gaps: Identify areas where safeguards or plans are incomplete, outdated, or ineffective.
Document Risks: Record any risks that are not adequately addressed.
Use Best Practices: Compare your procedures against industry standards and regulatory
requirements.
h. Provide Recommendations
i. Report Findings
Communicate Clearly: Use clear language and visuals to ensure the report is understandable.
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 23 of 32
Monitor Progress: Regularly review the implementation of improvements and adjust as needed.
Identify Potential Disasters: Consider natural disasters, cyber attacks, power failures, human
errors, and supply chain disruptions.
Conduct Risk Assessments: Evaluate the likelihood and impact of each potential disaster.
Pinpoint Vulnerabilities: Identify weaknesses in your infrastructure, systems, and
processes.
Set Goals: Determine key priorities, such as minimizing downtime, protecting data, and
ensuring employee safety.
Determine Scope: Decide which operations, systems, and assets are critical to include in
the strategy.
Mitigation Measures:
Implement firewalls, antivirus software, and regular system updates for cyber threats.
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 24 of 32
Ensure facilities comply with safety standards for natural disasters (e.g., flood barriers,
fire suppression systems).
Work with vendors to ensure they have robust disaster prevention measures.
Establish alternative suppliers to mitigate supply chain risks.
Recovery Objectives:
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 25 of 32
Internal Communication:
External Communication:
Conduct Simulations:
Evaluate Effectiveness:
Include risk assessments, preventive measures, recovery procedures, and contact lists.
Make it Accessible:
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 26 of 32
Assign Ownership:
Regular Reviews:
Reassess risks and update the strategy annually or after significant changes.
Monitor Compliance:
Ensure the strategy aligns with industry standards and regulatory requirements.
9. Leverage Technology
Automation:
Use automation tools for backups, system monitoring, and incident alerts.
Monitoring Tools:
Promote Awareness:
Encourage Feedback:
Foster Adaptability:
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 27 of 32
Self-check 1.1
Directions: Answer all the questions listed below.
Part-I: Choose the correct answer from the given alternatives
a) Risk Assessment
c) System Documentation
a) A fully operational facility with all necessary hardware and software pre-installed.
b) A facility with basic infrastructure (power, cooling) but lacking hardware and
software.
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 28 of 32
6. Which of the following is NOT a primary goal of network security in the context of
disaster recovery?
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 29 of 32
b) DRPs should be regularly tested and updated to reflect changes in the business
environment.
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 30 of 32
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 31 of 32
Developers Profile
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Logo Company Name: Form No.:
የሥራናክህሎትሚኒስቴር OF/MoLS/TVT/029
MINISTRY OF LABOR AND SKILLS
Form Title: Issue No: Page No:
Training module format 1 Page 32 of 32
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE