1. What includes programs specifically intended to penetrate or damage a computer system? Malware 2. What is extremely easy to breach? An unsecured computer 3. What malware’s name originates from Greek mythology? Trojan Horse 4. What is a program that records every keystroke made on a computer? Keylogging 5. What is the abuse of an email system called? Spamming 6. Which Internet fraud involves using social engineering techniques? Phishing 7. What is it called when someone wrongfully uses another person’s information? Identity theft 8. What is the most uncomplicated Internet fraud? Purchase scam 9. What means that one’s personal identity is not known? Anonymous 10. What is it called when someone glances at your computer to glean information? Shoulder surfing


No comments found.
Login to post a comment
This item has not received any review yet.
Login to review this item
No Questions / Answers added yet.
Price $21.00
Add To Cart

Buy Now
Category exam bundles
Comments 0
Rating
Sales 0

Buy Our Plan

We have

The latest updated Study Material Bundle with 100% Satisfaction guarantee

Visit Now
{{ userMessage }}
Processing