Answer the following statements true (T) or false (F)

1. An intruder can also be referred to as a hacker or cracker.
2. Activists are either individuals or members of an organized crime group with a goal of financial reward.
3. Running a packet sniffer on a workstation to capture usernames and passwords is an example of intrusion.
4. Those who hack into computers do so for the thrill of it or for status.
5. Intruders typically use steps from a common attack methodology.

1. True
2. False
3. True
4. True
5. True

Computer Science & Information Technology

You might also like to view...

When evaluating the efficiency of a search operation, you take a look at the ratio of true positives to false positives. The correct term for this statistic is ___________________

a. Precision b. Relevance c. Recal d. Dominance

Computer Science & Information Technology

Microsoft Publisher is an example of ____ software.

A. word processing B. desktop publishing C. presentation D. Web authoring

Computer Science & Information Technology