1. Ups devices typically run up to ____ va.
2. ________ a site means to take extraordinary measures to reduce a system's vulnerability.
3. ________ is the process of obscuring an attackers source ip address.
4. You can get comprehensive help at any time by pressing [____] in an office app.
5. ________ are the data that is deemed most important in the operation of a business.
6. Normal processing procedures for operations personnel involve procedures for ________.
7. Ensuring end users get prompt attention to their problems is __________.
8. Your organization's __________ sets the tone for how you approach related activities.
9. A computer that is controlled by a hacker or other computer criminal is referred to as a ____.
10. Forensics and incident response are examples of ___________ controls
11. As an is user, you have a right to a secure computing environment. this means that ________.
12. A password ________ a user.
13. A password ______ is a service that stores all of your account information securely.
14. A ___________ gives priorities to the functions an organization needs to keep going.