11) ________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones. A) Usurpation B) Cyber stalking C) Spoofing D) Sniffing ...





11) ________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.



A) Usurpation



B) Cyber stalking



C) Spoofing



D) Sniffing



12) A(n) ________ is a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations like governments.



A) advanced persistent threat



B) identity threat



C) copyright theft



D) network sniffer attack



13) A threat is a person or an organization that seeks to obtain or alter data illegally, without the owner's permission or knowledge.



14) Pretexting occurs when someone deceives by pretending to be someone else.



15) Spoofing is a technique for intercepting computer communications.



16) IP spoofing occurs when an intruder uses another site's IP address to masquerade as that other site.



17) Wardrivers are those who engage in phishing to obtain unauthorized access to data.



18) Incorrectly increasing a customer's discount is an example of incorrect data modification.



19) Advanced persistent threats can be a means to engage in cyber warfare and cyber espionage.







May 15, 2022
SOLUTION.PDF

Get Answer To This Question

Submit New Assignment

Copy and Paste Your Assignment Here