Remote Access Technologies
Backup and Recovery
Data Handling Best Practices
Data Handling Best Practices Part 2
Scripting Basics
100

Microsoft's proprietary remote access tool with a GUI that runs on port 3389.

What is Remote Desktop Protocol (RDP)?

100

The 3-2-1 Backup Rule.

What is keeping 3 copies of your data across 2 media types, with 1 copy being held offline and offsite?

100

Information that must be collected, processed, or stored in compliance with federal or state legislation.

What is Regulated Data?

100

The three methods of destroying a drive.

What are shredding, incinerating, and degaussing?

100

Shell scripting languages.

What are languages that use command specific to one operating system? (Bash, PowerShell)

200

The remote and encrypted command line tool that operates over port 22.

What is Secure Shell (SSH)?

200

A type of backup with lower data transfer requirements because it is assembled from previous backup jobs.

What is a Full Synthetic Backup?

200

When confidential/regulated data is read, copied, modified, or deleted without authorization.

What is a breach?

200

For drives with non-sensitive data on them ______ is suitable to destroy them rather than using other tools.

What are drills and hammers?

200

General Purpose Scripting Languages.

What are scripting languages independent of Operating System that get executed by an interpreter? (Python, JavaScript)

300

An open source alternative (port 5900) to Microsoft's proprietary remote access tool.

What is Virtual Network Computing (VNC)?

300

The type of backup where the backup job contains all of the data from the source and is roughly the same size as the source.

What is a Full Backup?

300

Personally Identifiable Information (PII).

What is information that may be used to identify, contact, locate, or steal the identity of an individual, like cell phone numbers, email addresses, or biometric data?

300

When you delete data from a drive, this happens.

What is the block/sector gets marked as writable, but the data doesn't actually get deleted?

300

Programming Language

What is a language that is used to compile an executable file that can be installed to an OS and run as an app? (Java, C#, C++)

400

The remote access tools operating over port 443 that allow a user to ask for help from a technician, but does not allow the technician to make changes with elevated permissions without the user's consent.

What are Microsoft Remote Assisstance and Quick Assist?

400

The type of backup where the backup chain starts with a full backup and later backups only select new files and files modified since the previous backup job.

What is a "Full with Incremental" Backup?

400

Personal Government Issued Information.

What is PII that is issued by the government, like SSNs, Passport numbers, etc?
400

A method that fills an HDD or SSD with 0s to mark all blocks on the drive as writable so the garbage collector will erase the data over time.

What is Secure Erase?

400

A powershell file's file extension.

What is .ps1?

500

A category of support software for managed service providers that can distinguish between client accounts and record/report billable support activity.

What is a Remote Monitoring and Management (RMM) tool?

500

The backup type where the backup chain begins with a full backup and later backups select new files and files modified since the original backup job.

What is a "Full with Differential" backup?

500

Payment Card Industry Data Security Standards (PCI DSS).

What is Industry enforced regulations mandating the security of credit/debit card transactions?

500

A method that performs full disk encryption, then destroys the key in order to make all data on the drive unrecoverable.

What is Instant Secure Erase?

500

A bash file's file extension.

What is .sh?

M
e
n
u