Which of the following is an example of an intentional unauthorized access or use?

A) Clicking a link in an e-mail that happens to contain malware
B) Installing a keylogger on a system in an attempt to collect usernames and passwords
C) Flooding a system with ping requests in an attempt to take it down
D) Viewing medical records to satisfy one’s curiosity


B) Installing a keylogger on a system in an attempt to collect usernames and passwords

Computer Science & Information Technology

You might also like to view...

A mixture of programming language and human language is known as:

a. Algorithms b. Recipes c. Directions d. Pseudocode

Computer Science & Information Technology

A(n) ________is a matrix that provides the results (TRUE or FALSE) for every possibility of an AND, OR, or NOT criteria combination

A) AND/OR/NOT tool B) evaluation matrix C) truth table D) goal table

Computer Science & Information Technology

Discuss at length the measurement of the time and space consumed by an algorithm in order to determine its efficiency.

What will be an ideal response?

Computer Science & Information Technology

Which of the following commands will list the time zones available on a Linux system?

A. date --timezones B. timedatectl list-timezones C. timezones D. tzlist

Computer Science & Information Technology