Which of the following is an example of an intentional unauthorized access or use?

A) Clicking a link in an e-mail that happens to contain malware
B) Installing a keylogger on a system in an attempt to collect usernames and passwords
C) Flooding a system with ping requests in an attempt to take it down
D) Viewing medical records to satisfy one’s curiosity

B) Installing a keylogger on a system in an attempt to collect usernames and passwords

Computer Science & Information Technology

You might also like to view...

List and briefly describe two controls found in the Controls group of the Design tab

What will be an ideal response?

Computer Science & Information Technology

You embed the data within a worksheet when you import data and maintain the link to its original source

Indicate whether the statement is true or false

Computer Science & Information Technology