Which of the following is an example of an intentional unauthorized access or use?

A. Clicking a link in an e-mail that happens to contain malware
B. Installing a keylogger on a system in an attempt to collect usernames and passwords
C. Flooding a system with ping requests in an attempt to take it down
D. View medical records to satisfy one's curiosity


Answer: B
Explanation: Installing a keylogger to collect usernames and passwords is an example of an unauthorized access or use. Flooding a system with ping requests is an example of a denial-of-service attack. Viewing medical records for curiosity is an example of inappropriate use.

Computer Science & Information Technology

You might also like to view...

Public key cryptography is so-named because:

a. It is highly popular b. Its use is not restricted by patents c. It utilizes an open source encryption algorithm d. The key that is used to encrypt a message does not need to be kept a secret, but can be made public

Computer Science & Information Technology

In a Base table, the property which will sequentially number each record as it is entered is called the ________ property

Fill in the blank(s) with correct word

Computer Science & Information Technology

The code necessary to read a number out of an EditText control calledtxtNumberOfTicketsand convert it to an integer, assigned to the variablenumTickets, is as follows: ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

An attack in which hackers transmit bogus requests for connection to servers or applications in order to harvest useful information to guide their attack efforts is known as what option below??

A. ?banner-grabbing attack B. ?reflective attack C. ?friendly attack D. ?IP spoofing attack

Computer Science & Information Technology