- HIPAA requires patient notification when there has been a data breach, unless _____________.
- What type of information is the most valuable to cyber criminals?
- A dental practice can assign ultimate responsibility for HIPAA Privacy and Security Rule Compliance to an outside vendor.
- Approximately how many pages of text can a gigabyte hold?
- When you delete a file on a computer _______________.
- What is the most common sign that a computer has been compromised?
- What steps should be taken to safeguard the information on a smartphone or other mobile device in case it’s stolen?
- A factory reset is designed to electronically remove all data and downloaded applications from a mobile device.
- Pentesting is _______________.
- Top rated commercial grade antivirus software is all you need to protect a system.
- A business email compromise relates to an attacker taking over an employee’s email account.
- An endpoint is ____________.
- An attacker can steal electronic data from a printer or photocopier.
- A Trojan is ____________.