Knowledge check

Completed
1.

What factors would influence or change the threat landscape faced by you or an organization?

2.

What does the term 'entry point' mean in a ransomware attack?

3.

In what instance would a cybercriminal use an Initial Access Broker?