Service

Chat Now

Which of the following is an example of a security threat resulting from malicious human

Which of the following is an example of a security threat resulting from malicious human

 Which of the following is an example of a security threat resulting from malicious human activity?

A) an employee who misunderstands operating procedures

B) an employee who accidentally deletes customer records

C) an employee who inadvertently installs an old database on top of the current one

D) an employee who intentionally destroys data or other system components

2) A person calls the Draper residence and pretends to represent a credit card company. He asks Mrs. Draper to confirm her credit card number. This is an example of ________.

A) hacking

B) phishing

C) pretexting

D) sniffing

3) Which of the following is a synonym for phishing?

A) drive-by sniffing

B) e-mail spoofing

C) IP spoofing

D) system hacking

4) ________ simply take computers with wireless connections through an area and search for unprotected wireless networks.

A) Drive-by sniffers

B) Spoofers

C) Hackers

D) Phishers

5) An employee carelessly releases proprietary data to the media. This is a case of ________ resulting from ________.

A) loss of infrastructure; human error

B) unauthorized data disclosure; human error

C) loss of infrastructure; malicious activity

D) unauthorized data disclosure; malicious activity

6) A ________ pretends to be a legitimate company and sends emails requesting confidential data.

A) hacker

B) phisher

C) drive-by sniffer

D) sniffer

7) Mark recently received an email from what appeared to be a legitimate company, asking him to update and verify his credit card details. Unknowingly, he obliged and later realized that the information had been misused. Mark is a victim of ________.

A) hacking

B) phishing

C) pretexting

D) sniffing

8) ________ is a technique for intercepting computer communications.

A) Spoofing

B) Hacking

C) Pretexting

D) Sniffing

9) ________ occur when bogus services flood a Web server.

A) Spoofing attacks

B) Hacking attacks

C) Phishing attacks

D) DOS attacks

10) Some unauthorized programs are able to ________ legitimate systems and substitute their own processing.

A) usurp

B) spoof

C) hack

D) flood

Tripti 07-Dec-2019

Answer (UnSolved)

question Get solution