41) List some of the regulatory laws that govern the secure storage of data in certain industries.
42) ________ are software or procedures used to prevent an information security attack.
A) Malware definitions
B) Countermeasures
C) Exploits
D) Attack vectors
43) Talgedco Inc., a software company, has taken several steps to secure its systems and data. The company has also installed a network intrusion detection system and data loss prevention system. Employees of this company have also been trained on the procedures to be followed to reduce the probability of a data breach. These steps taken by Talgedco are an example of ________.
A) attack vectors
B) countermeasures
C) malware
D) exfiltration
44) A(n) ________ is used to examine traffic passing through an organization's internal network.
A) honeypot
B) attack vector
C) security protocols open repository
D) network intrusion detection system
45) ________ are countermeasures designed to prevent sensitive data from being released to unauthorized persons.
A) Malware definitions
B) Attack vectors
C) Data loss prevention systems
D) Data extrusion prevention systems
46) Organizations can implement countermeasures that make data breaches impossible to occur.
47) It is easier for organizations to prepare a list of countermeasures against many different types of attacks and take appropriate measures accordingly.