Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
BUSN Study Set 3
Quiz 16: Managing Information Technology: Finding New Ways to Learn and Link
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 121
Multiple Choice
Keith, with his three other friends, sends email messages to people that appear to come from a legitimate business, such as a bank, credit card company, or retailer. With these official looking emails, they trick people to disclose their personal information such as passwords, usernames, and account numbers. In this scenario, Keith and his friends are involved in _____.
Question 122
Multiple Choice
_____ uses hardware or software to create a barrier that prevents unwanted messages or instructions from entering a computer system.
Question 123
Multiple Choice
_____ is similar to a virus, except that it is an independent program that can spread across computer networks without being attached to other files.
Question 124
Multiple Choice
Which of the following is a difference between phishing and pharming?
Question 125
Multiple Choice
Demi loves playing online games. She surfs through many websites to find new, interesting games. One day she finds that her mailbox is filled with emails suggesting websites for online games and ads promoting a few online offers. In this scenario, a(n) _____ tracks Demi's computer behavior to send her targeted mails and ads.
Question 126
Multiple Choice
The practice of using text messaging to entice cell phone users to visit a scammer's fake website asking them to provide personal or financial information is referred to as _____.