Matching
Match the computer crime term with its definition.
Premises:
Intentional defacement of Web sites
Unauthorized alterations to data stored on a computer system
An attempt to disrupt the operations of a network
Launching viruses, worms, and Trojan horses
Unauthorized access to a computer system to gain restricted information
Malware that combines more than one type of malicious program
Unauthorized copying of personal information
A type of program that secretly records keystrokes
A method for stealing user IDs and passwords
Redirecting small, unnoticeable amounts of money from large amounts
Responses:
brute force attack
blended threat
virus distribution
keylogger
denial of service
salami shaving
identity theft
vandalism
data diddling
information theft
Correct Answer:
Premises:
Responses:
Intentional defacement of Web sites
Unauthorized alterations to data stored on a computer system
An attempt to disrupt the operations of a network
Launching viruses, worms, and Trojan horses
Unauthorized access to a computer system to gain restricted information
Malware that combines more than one type of malicious program
Unauthorized copying of personal information
A type of program that secretly records keystrokes
A method for stealing user IDs and passwords
Redirecting small, unnoticeable amounts of money from large amounts
Premises:
Intentional defacement of Web sites
Unauthorized alterations to data stored on a computer system
An attempt to disrupt the operations of a network
Launching viruses, worms, and Trojan horses
Unauthorized access to a computer system to gain restricted information
Malware that combines more than one type of malicious program
Unauthorized copying of personal information
A type of program that secretly records keystrokes
A method for stealing user IDs and passwords
Redirecting small, unnoticeable amounts of money from large amounts
Responses:
Related Questions
Q77: A _ is a computer under the
Q78: _ is a type of program that
Q79: A _ is a set of program
Q80: Data security on a system that is
Q81: _ are rules that limit the directories
Q83: You have just been hired as an
Q84: You have just been hired as an
Q85: Your coworker, Casey, asks you to explain
Q86: List five symptoms of a computer infected
Q87: You have just been hired as an
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents