11) ________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.
A) Usurpation
B) Cyber stalking
C) Spoofing
D) Sniffing
12) A(n) ________ is a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations like governments.
A) advanced persistent threat
B) identity threat
C) copyright theft
D) network sniffer attack
13) A threat is a person or an organization that seeks to obtain or alter data illegally, without the owner's permission or knowledge.
14) Pretexting occurs when someone deceives by pretending to be someone else.
15) Spoofing is a technique for intercepting computer communications.
16) IP spoofing occurs when an intruder uses another site's IP address to masquerade as that other site.
17) Wardrivers are those who engage in phishing to obtain unauthorized access to data.
18) Incorrectly increasing a customer's discount is an example of incorrect data modification.
19) Advanced persistent threats can be a means to engage in cyber warfare and cyber espionage.