The term ____ is frequently used to describe the tasks of securing information that is in a digital format.
A ____ can be inserted into the security slot of a portable…
A ____ can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device, while a cable connected to the lock can then be secured to a desk or immobile object.
A _____ is a series of instructions that can be grouped toge…
A _____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
____ is the proportion of an asset’s value that is likely to…
____ is the proportion of an asset’s value that is likely to be destroyed by a particular risk.
A(n) ____ refers to an undocumented, yet benign, hidden fea…
A(n) ____ refers to an undocumented, yet benign, hidden feature, that launches by entering a set of special commands, key combinations, or mouse clicks.
List the steps of a DNS lookup.
List the steps of a DNS lookup.
A ____ in effect takes a snapshot of the current security of…
A ____ in effect takes a snapshot of the current security of the organization.
____ are combination locks that use buttons which must be pu…
____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
What are the three states of data that DLP typically examine…
What are the three states of data that DLP typically examines?
Targeted attacks against financial networks, unauthorized ac…
Targeted attacks against financial networks, unauthorized access to information, and the theft of personal information is sometimes known as ____.