Using computer systems to launch a terrorist attack is an example of which of the following?

A) Computer-based espionage
B) Information warfare
C) Cyber terrorism
D) Hacktivism


C) Cyber terrorism

Computer Science & Information Technology

You might also like to view...

What activities should the team carry out after the testing sessions?

What will be an ideal response?

Computer Science & Information Technology

The ____________________ displays when you drag-and-drop text and allows you to change the format of the text that was moved.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A previously- and professionally-created file such as a budget offered by Microsoft Office and often downloaded from their Web site is known as a template

Indicate whether the statement is true or false

Computer Science & Information Technology

Using the Auditpol.exe command-line command ________, you can display the current auditing policy

a. /get b. /list c. /show d. /retrieve

Computer Science & Information Technology