A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.
Correct Answer
verified
Multiple Choice
A) pretexting.
B) piggybacking.
C) posing.
D) spoofing.
Correct Answer
verified
Multiple Choice
A) hacking.
B) sniffing.
C) phreaking.
D) hijacking.
Correct Answer
verified
Multiple Choice
A) a zero-day attack.
B) a virus.
C) a spoof.
D) Bluesnarfing.
Correct Answer
verified
Multiple Choice
A) your school's website
B) a file sharing website
C) a social media website
D) your personal website
Correct Answer
verified
Multiple Choice
A) virus.
B) worm.
C) rootkit.
D) squirrel.
Correct Answer
verified
Multiple Choice
A) Bluesnarfing.
B) splogging.
C) vishing.
D) typosquatting.
Correct Answer
verified
Multiple Choice
A) text messages to gain sensitive information.
B) an invented scenario to gain sensitive information.
C) threat of physical force to gain sensitive information.
D) impersonation of somebody you know to gain sensitive information.
Correct Answer
verified
Multiple Choice
A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.
Correct Answer
verified
Multiple Choice
A) superzapping.
B) data diddling.
C) using a trap door.
D) piggybacking.
Correct Answer
verified
Multiple Choice
A) steganography
B) packet sniffers
C) trap doors
D) time bombs
Correct Answer
verified
Multiple Choice
A) snarfing.
B) Wi-pilfering.
C) war driving.
D) data slurping.
Correct Answer
verified
Multiple Choice
A) phreaking.
B) war dialing.
C) identity theft.
D) social engineering.
Correct Answer
verified
Multiple Choice
A) typosquatting.
B) carding.
C) pharming.
D) phishing.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) software that tells the user if anyone is spying on his computer.
B) software that monitors whether spies are looking at the computer.
C) software that monitors computing habits and sends the data it gathers to someone else.
D) none of the above
Correct Answer
verified
Multiple Choice
A) superzapping.
B) data leakage.
C) hacking.
D) piggybacking.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) snarfing.
B) web cramming.
C) podpounding.
D) e-scraping.
Correct Answer
verified
Multiple Choice
A) fake antivirus software.
B) an e-mail that threatens to kidnap the reader unless a ransom is paid.
C) free performance-maximizing software.
D) free apps.
Correct Answer
verified
Showing 21 - 40 of 60
Related Exams