Computer Fraud
Computer Fraud
Answer all questions.
A power outage is an example of a(n)_threat
Natural and political disasters
Software errors and equipment
Unintentional acts
System inefficiency
Excessive heat is an example on a(n)_threat.
Natural and political disasters
Software errors and equipment
Unintentional acts
System inefficiency
Social engineering facilitates what type of computer fraud?
Click Fraud
Identify theft
Spoofing
Dictionary attacks
Which of the following is Not a method that is used for identify theft ?
Dumpster diving
Phishing
Shoulder surfing
Spamming
A Computer fraud and abuse technique that steals information, trade secrets, and intellectual property.
Cyber-extortion
Data diddling
Industrial espionage
Skimming
A network of computers are used in a denial-of-service (DOS) attack is called a(n)
Botnet
Worm
Splog
Rootkit
Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or associated information
Cyber attack
Computer security
Cryptography
Digital Hacking
Which is it called when a cyber criminal designs fake websites or pages for tricking or gaining additional traffic.
Website-Duplication
Mimicking
Pharming
Spamming
Which of the following actions compromise a computer's security.
Vulnerability
Attack
Exploit
Threat
What is the existence of weakness in a system or network is known as ?
Attack
Vulnerability
Threat
Exploit