_______________ is often called the HIPAA of educational systems. It is a federal law that protects the privacy of student education records.
Blog
_____________________is a secure network connection that occ…
_____________________is a secure network connection that occurs through a public network. It can be used to connect individual users to a corporate network.
The first official business process when looking for a cloud…
The first official business process when looking for a cloud provider is a __________________________ (RFI). The purpose of an RFI is to collect written information about a CSP’s capabilities.
The purpose of______________________ iis to make files small…
The purpose of______________________ iis to make files smaller so they take up less storage space. It works by looking for repeated information within a file and then replacing that information with a shorter string.
__________________________ is the most common response to r…
__________________________ is the most common response to risk. In short, mitigation is the act of reducing risk through the expenditure of resources of the organization.
The ____________________________________ (SLA) defines met…
The ____________________________________ (SLA) defines metrics for measuring success. Both are critically important to have in the final contract.
___________________________ It’s used to provide a physical…
___________________________ It’s used to provide a physical connection between your company’s on-site network and the CSP’s network.
A _________________ is someone with a vested interest or con…
A _________________ is someone with a vested interest or concern in something. It is an important person with a vested interest or concern in something.
_________________________is to Linux instances what RDP is t…
_________________________is to Linux instances what RDP is to Windows Server instances. It allows clients to remotely connect to a virtual Linux machine, securely, and act as if the user were sitting at the virtual computer.
Risk ________________________ is the most common response to…
Risk ________________________ is the most common response to risk. In short, mitigation is the act of reducing risk through the expenditure of resources of the organization.