Which of the following is an example of an intentional unauthorized access or use?
A. Clicking a link in an e-mail that happens to contain malware
B. Installing a keylogger on a system in an attempt to collect usernames and passwords
C. Flooding a system with ping requests in an attempt to take it down
D. View medical records to satisfy one's curiosity
Answer: B
Explanation: Installing a keylogger to collect usernames and passwords is an example of an unauthorized access or use. Flooding a system with ping requests is an example of a denial-of-service attack. Viewing medical records for curiosity is an example of inappropriate use.
You might also like to view...
Public key cryptography is so-named because:
a. It is highly popular b. Its use is not restricted by patents c. It utilizes an open source encryption algorithm d. The key that is used to encrypt a message does not need to be kept a secret, but can be made public
In a Base table, the property which will sequentially number each record as it is entered is called the ________ property
Fill in the blank(s) with correct word
The code necessary to read a number out of an EditText control calledtxtNumberOfTicketsand convert it to an integer, assigned to the variablenumTickets, is as follows: ____________________.
Fill in the blank(s) with the appropriate word(s).
An attack in which hackers transmit bogus requests for connection to servers or applications in order to harvest useful information to guide their attack efforts is known as what option below??
A. ?banner-grabbing attack B. ?reflective attack C. ?friendly attack D. ?IP spoofing attack