64 in the context of the sources of threats computer crime involves a poorly designe 4312903

64 in the context of the sources of threats computer crime involves a poorly designe 4312903

64) In the context of the sources of threats, computer crime involves ________.

A) poorly designed procedures

B) intentional destruction of data

C) natural events and disasters

D) poorly written applications

65) ________ refers to a social engineering attack in which someone deceives by pretending to be someone else.

A) Pretexting

B) Keylogging

C) Sniffing

D) Denial of service

66) ________ is a social engineering technique in which a person pretends to be a legitimate company and sends emails requesting confidential data.

A) Phishing

B) Keylogging

C) Sniffing

D) Denial of service

67) You receive an email from a reputed company claiming that it will pay you a large sum of money if you provide your bank account details. Later, you identify that the email was not sent by the company. This scenario exemplifies ________.

A) sniffing

B) keylogging

C) phishing

D) denial of service

68) A group of intruders accessed RK Bank's IP address and accepted payments on the bank's behalf. This attack is an example of ________.

A) sniffing

B) keylogging

C) spoofing

D) denial of service

69) Which of the following is a technique for intercepting computer communications?

A) phishing

B) sniffing

C) keystroke logging

D) pretexting

70) Browsing through an online blog, Ronnie clicks on one of the blogger's links and is logged out of his system. He loses access to his system due to a malicious code that was downloaded from the link. This is a clear case of ________.

A) cross site scripting

B) phishing

C) spamming

D) denial of service

71) ________ occurs when a person breaks into computers, servers, or networks to steal data.

A) Phishing

B) Pretexting

C) Digital footprinting

D) Hacking

72) A malicious hacker flooded an online retailer's server with millions of bogus transactions. Due to this, the Web site's server was overloaded and the site was unable to process legitimate customer orders. Which of the following is being illustrated in this scenario?

A) spoofing

B) sniffing

C) phishing

D) denial-of-service

73) Which of the following is characteristic of a strong password?

A) It should not contain any word in any language.

B) It should not have special characters.

C) It should not be long or complex to remember.

D) It should not be different across varied accounts.

Looking for a similar assignment? Get help from our qualified experts!

Order Now

Related Posts