ACL
What is Access Control List?
A form of social engineering in which a cyber threat actor poses as a trustworthy colleague, acquaintance, or organization to lure a victim into providing sensitive information or network access.
What is Phishing?
This is a cloud-to-cloud backup solution that protects data in SaaS applications like Microsoft 365 and Google Workspace.
What is Datto SaaS Protect?
Formerly known as Azure Active Directory, it is a comprehensive identity and access management solution offered by Microsoft.
What is Microsoft Entra ID?
SMB
What is Server Message Block?
A type of malware that encrypts a victim’s data and demands payment for the decryption key.
What is Ransomware?
Commonly used by ST, a data protection and disaster recovery software solution for virtual, physical, and cloud environments.
What is Veeam Backup & Replication?
This allows administrators to define the conditions under which users can access corporate resources by considering signals such as user identity, device status, location, and risk levels.
What is Conditional Access?
NAT
What is Network Address Translation?
This records every keystroke made on a computer to capture sensitive information like passwords and credit card numbers.
What is a Keylogger?
Automatically switching to a redundant or standby system upon the failure of the primary system.
What is Failover?
This feature allows users to sign in with a single set of credentials.
What is Single Sign-On (SSO)?
APIPA
What is Automatic Private Internet Protocol Addressing?
An attack method where an attacker tries a few commonly used passwords against many different accounts to avoid detection.
What is Password Spraying?
A detailed document that outlines how an organization will respond to an unplanned incident and resume business operations.
What is a Disaster Recovery Plan?
This portal is used for managing Microsoft 365 services and users.
What is the Microsoft 365 Admin Center?
CAPTCHA
What is Completely Automated Public Turing Test to Tell Computers and Humans Apart?
Technical solutions or applications that are used by end users without the approval of centralized IT teams.
What is Shadow IT?
A type of backup that includes the operating system and all the data associated with it, including the system state and application configurations.
What is an Image?
This Microsoft 365 license is designed for small to medium-sized businesses and includes Defender for Office 365 Plan 1 and Entra ID Plan 1.
What is Microsoft 365 Business Premium?