Hacking into phone systems is called ___________

a. Telnetting
b. Dial hacking
c. Phreaking
d. None of the above

Answer C.

Computer Science & Information Technology

You might also like to view...

A technician needs to verify an Ethernet run is functioning properly. Which of the following tools should be used?

A. Protocol analyzer B. Crimper C. Cable tester D. Punch down tool

Computer Science & Information Technology

The ____________________ of the catch block parameter specifies the type of exception that the catch block can catch.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology