1
Accessing files or a network without permission is called ........................ access
2
network ...................... : split the network in smaller chunks
3
The 3 types of backup are full, ............................... and differential
4
Network address ................ or NAT is used to hide business public IP addresses
5
The 4 types of losses are financial, reputational, intellectual property and what?
6
Data .................. act ensures peoples personal data is kept private
7
The 3 types of keys used in encryption are public and ............... keys
8
VPN stands for ...................... Private Network