Artificial Intelligence
Please fill the required field.

The function of a Business Impact Analysis (BIA) is primarily to **b. Identify critical processes and potential disruptions**. A BIA helps organizations understand the effects of interruptions to their business operations and assesses the impact of various risks and disruptions on critical business functions. It is a key component of business continuity planning.

The term that best defines unauthorized access to systems or data is **a. Exposure**. However, in a more specific context, unauthorized access can also be described using terms related to security breaches, but from the given options, "exposure" is the closest fit. - **Authentication** refers to verifying the identity of a user or system. - **Access Control** pertains to the policies that restrict who can access certain resources. - **Session

The main focus of security governance is **b. Aligning security with business objectives**. Security governance involves establishing a framework to ensure that security strategies are aligned with business goals and that they effectively manage risk, comply with regulations, and protect the organization's assets.