Match the cybercrime term in Column 1 to its means of attack in Column 2

Column 1 Column 2
5. Spoofing a. Use of a telephone to obtain information
6. Vishing b. Use of a website or e-mail to obtain information
7. Phishing c. Use of a computer network to overload a system
8. Denial of Service d. Using trickery to gain access to a system


5. d
6. a
7. b
8. c

Criminal Justice

You might also like to view...

Race and ethnicity are often associated with specific types of violent crimes.

Answer the following statement true (T) or false (F)

Criminal Justice

Power legitimized over time becomes characterized as authority

Indicate whether the statement is true or false

Criminal Justice

Both male and female gang members spend a lot of their time "partying," "kicking it," and just "hanging out" and the use of drugs and alcohol is common

Indicate whether the statement is true or false

Criminal Justice

Which of the following is the most effective new crime-fighting tool?

A. DNA profiling B. Racial profiling C. Predictive policing D. Proactive policing

Criminal Justice