When a system automatically switches to the use of a backup component in the event the primary component becomes unavailable.
What is failover?
Encryption in which sender and receiver share a single secret key.
What is symmetric encryption?
The site used to manage updates for Windows and associated software.
What is Windows Update?
One example of a setting in which the user should have no expectation of privacy.
What are social networking sites, instant messaging, online bulletin boards.
Most important assets for most businesses.
What are data and information?
A solution for redundancy that addresses the risk of system unavailability due to disk failure.
What is a RAID?
This type of encryption cannot be reversed and is often used to store passwords.
What is a cryptographic hash?
A file containing corrected or updated code for an application.
What is a patch or update?
A set of instructions for carrying out a task in an organization in the approved manner.
What is a procedure (or Standard Operating Procedure)?
Information about information: where and when you use an online service, the language you use, the sites you access, keywords from your posts and messages, the kind of device you're using, etc.
What is metadata?
A backup plan for carrying out an operation if something goes wrong.
What is a contingency plan?
Two ways data at rest may be protected.
What are file level and disk level encryption?
Backing up system files as well as data files.
What is a system backup?
Using deception to gain access to confidential information.
What is social engineering?
Redirects web traffic intended for a legitimate site to a malicious site that looks identical to the legitimate website.
What is pharming?
This RAID configuration requires at least three disks and uses striping with parity for fault tolerance.
What is RAID 5?
Type of encryption most commonly used for authentication.
What is asymmetric encryption?
Every PC should run this security solution to control which internet traffic is permitted, but only one can be installed at any given time.
What is a host firewall?
Specifies exactly what can be done with such things as the corporate network, website, computer/systems, and facilities.
What is an Acceptable Use Policy (AUC)?
This practice is the only way to be sure that your protections against data loss are working, and it must be carried out only by trusted personnel.
What is testing restoration procedures?
In this part of disaster recovery, an organization considers both business needs and dependencies when deciding which systems to restore first.
What is prioritization?
Subjects are validated by a digital certificate from a trusted CA, allowing the client to send sensitive information in an asymmetric encryption exchange.
What is Public Key Infrastructure?
Two steps to take if you must use a driver that is no longer supported on the OEM's own site.
What are researching third-party sites offering drivers and check for a digital certificate and HTTPS connection?
Along with physical destruction, a way to securely dispose of sensitive information on an HDD.
What is using a utility to wipe sensitive data by overwriting it?
Three ways cybercriminals may obtain a target's passwords.
What are dictionary attacks, brute force attacks, MITM/on-path, keylogging, shoulder surfing, phishing, pharming.