Answer:
1. Control Activities
2. Internal
Explanation:
Considering the scenario explained in the question, it can be concluded that This is an IT application of the COSO principle of CONTROL ACTIVITIES and evidence PREVENTIVE controls.
In this case, the Control Activities which is one of the five principles of COSO (Committee of Sponsoring Organizations of the Treadway Commission) is a means of selecting and developing general control over technology, through strategies and techniques. This is what the medical records company did by building controls into its systems to prevent hackers from accessing its system.
This is an example of internal CONTROL ACTIVITIES that illustrates PREVENTIVE control against potential risks or hacks.
 
        
             
        
        
        
Zenmap is the graphical User Interface representation for
NMAP Security Scanner. It is an open-source program designed to make NMAP easy
for starters to use. Typically, it is used to collect and identify a list of
hosts, OS, as well what services are running on them by using a port scanning
tool. It is used specifically for the scanning and vulnerability phase of
ethical hacking. 
A network administrator who wishes to audit all the devices
on a specific IP scheme in a network can use NMAP. The admin can go ahead and
scan the ports to know exactly which ports are closed and which
are opened.
 
        
             
        
        
        
Answer: Reach and frequency 
Explanation:
  The media strategy is the planning and action that basically involve high reach in the exposure by using the media vehicle. It basically improve the overall conversation rate of customers. 
The conversation rate is refers to the total percentage of the users which involve using the website and various applications. 
This strategy also involve with high frequency that limited the list of the media vehicle.