•
Question 3
____________ is the practice of hiding data and keeping it away from unauthorized
users.
•
Question 4
Connecting your computers or devices to the ________ immediately exposes them to
attack.
•
Question 5
A ___________ defines how a business gets back on its feet after a major disaster like
a fire or hurricane.
•
Question 6