Artificial Intelligence
Please fill the required field.

According to the assigned video, which technique was part of this cyber attack? Group of answer choices Trojan horse Penetration test Encryption Ransomware


To accurately respond to your question, I would need specific details or context from the assigned video you are referring to. However, I can provide a brief overview of the techniques mentioned: 1. **Trojan horse**: This is a type of malware that disguises itself as legitimate software to trick users into installing it. 2. **Penetration test**: This is a method used to evaluate the security of a system by simulating an attack from a malicious actor. 3. **Encryption**: This is a method of securing data by converting it into a code to prevent unauthorized access. 4. **Ransomware**: This is a type of malware that encrypts a user's files and demands a ransom payment for the decryption key. If the video discussed a particular cyber attack involving data being held for ransom, "ransomware" would likely be the correct answer. If it explained a scenario focusing on deceptive software, then "Trojan horse" might be more appropriate. Please refer back to the content of the video for the most accurate choice.