Case 5-2
Doug, a computer enthusiast, uses computers to perform some notorious tasks.
Doug accesses his friend Sasha's Facebook account without her knowledge and sends a message that contains a phishing link to her friends on Facebook. This is a case of _____.
A. ?a denial of service attack
B. ?system piggybacking
C. ?social war driving
D. ?social media hacking
Answer: D
Computer Science & Information Technology
You might also like to view...
A button fires events know as:
a. static events b. passive events c. dynamic events d. action events
Computer Science & Information Technology
When working with a report in Design view, clicking the ________ button selects the entire report
Fill in the blank(s) with correct word
Computer Science & Information Technology
When signing in to a computer, a(n) ________ can be used in place of a password
Fill in the blank(s) with correct word
Computer Science & Information Technology
Jared wants to create a hyperlink to link to new a document. What should he click in the Link to list?
A. Existing File or Web Page B. Create New Document C. E-mail address D. Place in This Document
Computer Science & Information Technology