Introduction to Cyber Attacks Answer