What cybercrime method uses a network to send copies of itself to other systems?
a. a worm
b. a salami attack
c. piggybacking
d. data diddling
a
You might also like to view...
Which of the following program/therapy was especially useful in reducing recidivism among high risk offenders and was effective across secure and community settings?
A) Cognitive behavioral therapy B) Beck Hopelessness Scales C) Brief Reasons for Living Inventory D) Suicidal Crisis Inventory Assessment E) Personality Assessment Scheduler
Which of the following is not true regarding the use of questions?
A. Questions to students requiring thinking and reasoning can be used to reveal the extent to which they have absorbed the material needed to perform a task. B. Questions can be used to spot-check the student's progress or to reveal the need for review. C. A simple question, tactfully asked, is sometimes a useful device to gain the attention of an inattentive student. D. Questions may sometimes be used as a club to embarrass, chastise, or reveal the ignorance of a student.
The most prevalent law enforcement response to identified problems is generally increased use of conventional strategies such as enforcement and patrol
a. True b. False Indicate whether the statement is true or false
The idea that police educational requirements are made of a "patchwork quilt" means
a. That various, diverse requirements exist b. That there is no one, specific set of requirements c. That there is not a linear tract for potential police officer candidates to travel d. All of the above