According to the assigned video, which technique was part of this cyber attack? Group of answer choices Trojan horse Penetration test Encryption Ransomware
To accurately respond to your question, I would need specific details or context from the assigned video you are referring to. However, I can provide a brief overview of the techniques mentioned:
1. **Trojan horse**: This is a type of malware that disguises itself as legitimate software to trick users into installing it.
2. **Penetration test**: This is a method used to evaluate the security of a system by simulating an attack from a malicious actor.
3. **Encryption**: This is a method of securing data by converting it into a code to prevent unauthorized access.
4. **Ransomware**: This is a type of malware that encrypts a user's files and demands a ransom payment for the decryption key.
If the video discussed a particular cyber attack involving data being held for ransom, "ransomware" would likely be the correct answer. If it explained a scenario focusing on deceptive software, then "Trojan horse" might be more appropriate. Please refer back to the content of the video for the most accurate choice.