Which of the following is an example of an intentional unauthorized access or use?
A) Clicking a link in an e-mail that happens to contain malware
B) Installing a keylogger on a system in an attempt to collect usernames and passwords
C) Flooding a system with ping requests in an attempt to take it down
D) Viewing medical records to satisfy one’s curiosity
B) Installing a keylogger on a system in an attempt to collect usernames and passwords
Computer Science & Information Technology
You might also like to view...
List and briefly describe two controls found in the Controls group of the Design tab
What will be an ideal response?
Computer Science & Information Technology
You embed the data within a worksheet when you import data and maintain the link to its original source
Indicate whether the statement is true or false
Computer Science & Information Technology