Case 5-2
Doug, a computer enthusiast, uses computers to perform some notorious tasks.
Doug accesses his friend Sasha's Facebook account without her knowledge and sends a message that contains a phishing link to her friends on Facebook. This is a case of _____.

A. ?a denial of service attack
B. ?system piggybacking
C. ?social war driving
D. ?social media hacking


Answer: D

Computer Science & Information Technology

You might also like to view...

A button fires events know as:

a. static events b. passive events c. dynamic events d. action events

Computer Science & Information Technology

When working with a report in Design view, clicking the ________ button selects the entire report

Fill in the blank(s) with correct word

Computer Science & Information Technology

When signing in to a computer, a(n) ________ can be used in place of a password

Fill in the blank(s) with correct word

Computer Science & Information Technology

Jared wants to create a hyperlink to link to new a document. What should he click in the Link to list?

A. Existing File or Web Page B. Create New Document C. E-mail address D. Place in This Document

Computer Science & Information Technology