4, 7 , 2
A(n) _____ is the technique used to gain unauthorized access to a device or a
network - Correct Answer ✔️✔️attack vector
A blended threat, phishing, and virus are all examples of a(n) - Correct Answer
✔️✔️attack vector
A form of cyberattack that is estimated to occur every 10 seconds against an
individual in the U.S. is - Correct Answer ✔️✔️ransomware
One of the consequences of a successful cyberattack that can lead to monetary
penalties for organizations that fail to comply with data protection regulations
is - Correct Answer ✔️✔️legal consequences
A federal law that focuses on unlawful access to stored communications to
obtain, alter, or prevent authorized access to a wire or electronic
communication while it is in electronic storage - Correct Answer ✔️✔
️Stored Wire and Electronic Communications and Transactional Records
Access Statue
, The four levels at which the CIA security triad must be implemented include -
Correct Answer ✔️✔️organizational, network, application, and end user
Each user should conduct a security self-assessment test. True or False -
Correct Answer ✔️✔️true
There are _____ steps that must be taken to perform a thorough security risk
assessment - Correct Answer ✔️✔️eight
Five actions an organization must take in the event of a successful cyberattack
include incident notification, protection of evidence and activity logs, incident
containment, eradication, and incident - Correct Answer ✔️✔️follow-up
An organization that monitors, manages, and maintains computer and network
security for other organizations is called a _____ service provider - Correct
Answer ✔️✔️managed security
Computer forensics is a discipline that combines elements of _____ and
computer science - Correct Answer ✔️✔️law
_____ is not a specific goal of green computing - Correct Answer ✔️✔
️Combating global climate change