Match the following terms with their descriptions

6. Script kiddies a. routinely held conferences to discuss their exploits and successes
7. Cybercriminal organizations b. target data which is valuable on its face
8. Crackers c. are the lowest life form of cybercriminal
9. Phreakers d. used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
10. Cyberpunks e. groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime


Answer: 6. c
7. e
8. b
9. a
10. d

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a collection of multiple objects treated as one unit that can be copied, moved, or formatted

Fill in the blank(s) with correct word

Computer Science & Information Technology

What type of technology does WiMAX use to send data between two towers?

A) Wireless hotspot B) Satellite connectivity C) Line-of-sight network D) Dial-up

Computer Science & Information Technology

Many individuals today prefer various forms of ________ communication, where messages and conversations between two or more people occur instantaneously.

A. P2P B. email C. social D. real-time

Computer Science & Information Technology

If a technician does not assign an IP address to a device, the DHCP server will assign the device

A. static IP address. B. reservation. C. dynamic IP address. D. MAC address.

Computer Science & Information Technology