_____ is a United States federal law passed in 2002 that made it a requirement for federal agencies to develop, document, and implement an information security and protection program.
This type of cyber attack locks out the rightful user of a computer or computer network and holds it hostage until the victim pays a fee
Critical vulnerabilities must be remediated within ___calendar days of initial detection.
The measures that protect and defend information and information systems by ensuring their availability, integrity, and confidentiality is know as ___ assurance
The ___ ___ group is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations to manage vulnerabilities to the Department’s information technology networks and enterprise mobile infrastructure.
A ___ is a remote network of zombie drones under the control of a black hat. Attackers use various malware and viruses to take control of computers to form a robotic network, which will send further attacks such as spam and viruses to target computers or networks.
The _ and _ _ _ (acronym) is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations (CO) to meet responsibilities documented in 5 FAM 1063.
A ____ is equal to 1,2 8,925,819,614,629,174,7 6,176 (28 ) bits, or 1, , , , , , , , (1 24) bytes and is the largest recognized value used with storage.
IRM’s _ _ _ was established by the CIO as IRM’s operationally focused cybersecurity organization responsible for cybersecurity compliance, threat analysis, preventative control monitoring, and incident response across all IRM-managed networks.
Denial of ___ is an attack that prevents or impairs the authorized use of information system resources or services