Microsoft's proprietary remote access tool with a GUI that runs on port 3389.
What is Remote Desktop Protocol (RDP)?
The 3-2-1 Backup Rule.
What is keeping 3 copies of your data across 2 media types, with 1 copy being held offline and offsite?
Information that must be collected, processed, or stored in compliance with federal or state legislation.
What is Regulated Data?
The three methods of destroying a drive.
What are shredding, incinerating, and degaussing?
Shell scripting languages.
What are languages that use command specific to one operating system? (Bash, PowerShell)
The remote and encrypted command line tool that operates over port 22.
What is Secure Shell (SSH)?
A type of backup with lower data transfer requirements because it is assembled from previous backup jobs.
What is a Full Synthetic Backup?
When confidential/regulated data is read, copied, modified, or deleted without authorization.
What is a breach?
For drives with non-sensitive data on them ______ is suitable to destroy them rather than using other tools.
What are drills and hammers?
General Purpose Scripting Languages.
What are scripting languages independent of Operating System that get executed by an interpreter? (Python, JavaScript)
An open source alternative (port 5900) to Microsoft's proprietary remote access tool.
What is Virtual Network Computing (VNC)?
The type of backup where the backup job contains all of the data from the source and is roughly the same size as the source.
What is a Full Backup?
Personally Identifiable Information (PII).
What is information that may be used to identify, contact, locate, or steal the identity of an individual, like cell phone numbers, email addresses, or biometric data?
When you delete data from a drive, this happens.
What is the block/sector gets marked as writable, but the data doesn't actually get deleted?
Programming Language
What is a language that is used to compile an executable file that can be installed to an OS and run as an app? (Java, C#, C++)
The remote access tools operating over port 443 that allow a user to ask for help from a technician, but does not allow the technician to make changes with elevated permissions without the user's consent.
What are Microsoft Remote Assisstance and Quick Assist?
The type of backup where the backup chain starts with a full backup and later backups only select new files and files modified since the previous backup job.
What is a "Full with Incremental" Backup?
Personal Government Issued Information.
A method that fills an HDD or SSD with 0s to mark all blocks on the drive as writable so the garbage collector will erase the data over time.
What is Secure Erase?
A powershell file's file extension.
What is .ps1?
A category of support software for managed service providers that can distinguish between client accounts and record/report billable support activity.
What is a Remote Monitoring and Management (RMM) tool?
The backup type where the backup chain begins with a full backup and later backups select new files and files modified since the original backup job.
What is a "Full with Differential" backup?
Payment Card Industry Data Security Standards (PCI DSS).
What is Industry enforced regulations mandating the security of credit/debit card transactions?
A method that performs full disk encryption, then destroys the key in order to make all data on the drive unrecoverable.
What is Instant Secure Erase?
A bash file's file extension.
What is .sh?