Match each item with a statement below.

A. The steps that ensure that the individual is who he or she claims to be
B. A password attack in which every possible combination of letters, numbers, and characters is used to match passwords in a stolen password file
C. A password attack that compares common dictionary words against those in a stolen password file.
D. A secret combination of letters, numbers, and/or symbols that serves to authenticate a user by what he or she knows
E. Viewing information that is entered by another person
F. Grouping individuals and organizations into clusters based on an affiliation
G. Redirecting a user to a fictitious website based on a misspelling of the URL
H. A phishing attack in which the attacker calls the victim on the telephone
I. A phishing attack that targets wealthy individuals


A. Authentication
B. Brute force attack
C. Dictionary attack
D. Password
E. Shoulder surfing
F. Social engineering
G. Typo squatting
H. Vishing
I. Whaling

Computer Science & Information Technology

You might also like to view...

? Referring to the figure above, which item represents a preview of the button to be generated based on your selections?

A. a B. b C. c D. d

Computer Science & Information Technology

Which of the following commands allows a standard user to execute a single command as root without actually switching to the root account?

A. su B. sudo C. sudoer D. doas

Computer Science & Information Technology

You have set up a TFTP server to support PXE booting of several workstations. Which of the following protocols would this setup make use of?

A. TCP B. UDP C. ICMP D. IGMP

Computer Science & Information Technology

What is the output of the following code?

a. 7 8 9
b. 9 10 11
c. 8 9 10
d. 7 8 9 10

Computer Science & Information Technology