9) Explain how hackers use information stolen from data breaches for credit card forgery.
10) The first step in protecting oneself from data breaches is ________.
A) securing credit and debit card details
B) understanding how they happen
C) learning the technologies used for these activities
D) installing necessary software to protect from possible breaches
11) ________ refers to a software used by hackers to take advantage of a newly discovered vulnerability in a target's application or operating system.
A) Exploit
B) Attack vector
C) Data breach
D) Wardriver
12) A group of hackers use a targeted phishing attack to breach a company's firewalls and hack into its security system. Which of the following techniques have the hackers used?
A) pretexting
B) IP spoofing
C) spear phishing
D) phone phishing
13) A group of hackers decide to steal credit card details of the users of Swift Shopping Inc., a leading e-commerce company. They infect the security system of the company's third-party vendor and gain access into its internal network. They compromise an internal Windows server of the company and use a malware to extract customer data. Which of the following is illustrated in this scenario?
A) hardening
B) carding
C) pretexting
D) data breaching
14) Each type of data breach is different because hackers are continually developing new tools and techniques that enable them to steal more data.