Identify applications: Business processes that have been classified with RTOs an
ID: 3660775 • Letter: I
Question
Identify applications: Business processes that have been classified with RTOs and RPOs must be mapped to supporting applications systems along with their data. As stated before, applications are classified as mission-critical, critical, essential, or noncritical. As is often the case, a business process will depend on multiple applications that support the business process. These applications systems need to be identified with the same RTOs and RPOs as their supported business process. Identify System Recovery Time (SRT): System Recovery Time (SRT) activity takes place after a disaster is confirmed. The organization must plan the order of priority that it will use to recover hardware systems and components, in order to meet business process RTO. Within the short timeframes of RTO, the DRP often entails the setting up of recovery host systems and related components. The host systems and related components execute the applications that perform the business processes. Hardware infrastructure components needed by the application systems and the data required to support the business process must be identified. All application interdependencies, network infrastructure components, and support staff need to be identified as well. The RTO is used to determine the host component SRT and is carried through from the business process to the application. There are several ways to bring the SRT within specification if a host componentExplanation / Answer
here is your summary : A business process mainly depends on the applications that support the process. main classification of these types of applications includes : mission-critical, critical, essential, or noncritical. These applications systems need to be identified with the same RTOs and RPOs as their supported business process. in order to meet business process RTO, the organization should plan the order of priority that it will use to recover the hardware, for which we have to Identify System Recovery Time (SRT), which usually takes palce after the confirmation of any disaster.The RTO is used to determine the host component SRT and is carried through from the business process to the application. There are several ways to bring the SRT within specification if a host component’s system recovery time can not meet expectations set by the business process. A different disaster recovery suite can be selected that will accommodate the business process RTO. The RTO is used to determine the host component SRT and is carried through from the business process to the application. There are several ways to bring the SRT within specification if a host component’s system recovery time can not meet expectations set by the business process. A different disaster recovery suite can be selected that will accommodate the business process RTO. To obtain the most value from a disaster recovery test, explicit test objectives and success criteria are required.The use of test objectives and success criteria enable the effectiveness of each DRP element and the overall Business Continuity Plan to be assessed. The two major test criteria are the recovery of the business process within its RTO with data currency within the RPO. the criteria are: 1) Alert Notification/Assessment/Disaster Declaration timeframe is tested and confirmed outside of the context of a system disaster recovery test. 2) System Recovery Time is contained within the application RTO. SRT is tested through a system recovery exercise to determine if recovery operations can be completed within the stated objective. Standard operating procedures and operational logs are inspected and verified to determine if the data has been transported off site from the production computing center so that RPOs can be met within the stated objective. Testing a DRP can be a very complex engagement. the objectives of Business Continuity Plan and Disaster Recovery Plan are different, the former one is to continue business processes while the later one is to replicate parts of or the entire existing IT production environment at an alternate site until normal operations have been resumed.