1
A business must perform a .......... ........................... on their systems to protect against new threats
2
What is the name of the software responsible for protecting a device against malware attacks?
3
An information security incident may affect the Confidentiality, ........................, and/or availability of the data
4
What protection measure protects against unauthorised network access?
5
.................. help govern user behavior and protect from human error
6
We must use a risk ...................... to calculate risk
7
A ............... is a person who gains unauthorised access to a network
8
The most secure wireless encryption is .................