Using computer systems to obtain confidential information is an example of which of the following?

a. Computer-based espionage
b. Information warfare
c. Cyber terrorism
d. Hacktivism

ANS: A

Computer Science & Information Technology

You might also like to view...

IPv6 Addresses can be Unicast, Multicast, or _______

a. Broadcast b. Omnicast c. Anycast d. None of the above

Computer Science & Information Technology

Which of the following are activities conducted during the initial response portion of the incident response plan?

A. Incident declaration, internal notification, and activation of an incident response team B. Steps taken to prevent the incident from spreading C. Establishing processes and a knowledge base to accurately detect and assess precursors and indicators D. Elimination of components of the incident

Computer Science & Information Technology