Across
- 3. Network _____ Authentication requires users to authenticate before a remote desktop session is established, adding an extra layer of security and protecting against unauthorized access.
- 7. _____ refers to the period of time that a particular backup job or backup data is kept and retained in the backup storage.
- 8. ______ licensing involves the legal permissions and restrictions associated with the use, distribution, and modification of software.
- 9. macOS _____ Sharing is a specific feature of remote desktop technology tailored for macOS devices.
- 10. File ______ is a feature in Windows that automatically backs up versions of files in the Documents, Pictures, Music, Videos, and Desktop folders.
- 13. _____ provides screen sharing and remote control capabilities for Windows, macOS, Linux, and other operating systems.
- 14. ______ data types refer to specific categories of sensitive information that are subject to legal and regulatory requirements,which mandate their protection and secure handling
- 16. _____ backup refers to a method where data is continuously or periodically backed up to remote servers or cloud storage over the internet.
- 17. Remote ______ and Management (RMM) tools are broader in scope and focus on remote monitoring, management, and support of various endpoints, including servers and network devices.
- 21. ________ response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack.
Down
- 1. ______ is a legal contract between the software vendor and the end user.
- 2. _____ desktop tools are software applications that allow users to access and control a computer or device from a remote location over the internet or a network.
- 4. ______ in the context of backup jobs, refers to the period or interval between successive backup operations.
- 5. Data backup and ______ operations are critical for ensuring the availability and integrity of data, as well as the continuity of business operations.
- 6. ____ methods for file servers and database servers require careful planning and devotion to policies.
- 11. _____ backup generates an updated full backup from the original full backup and incremental backups, eliminating the need for another full backup.
- 12. Digital _______ evidence refers to information and data collected from digital sources that can be used in legal investigations or proceedings.
- 15. ____ refers to technologies and techniques used to control access to digital content and protect intellectual property rights.
- 18. _____ backup involves storing data on physical media (such as external hard drives, tapes, or DVDs) that are disconnected from the computer or network after the backup process.
- 19. ___ is made up of three separate backup rotations.
- 20. ______ is a dedicated team responsible for managing and responding to security incidents.
