Match the following terms with their description

I. Cybercrime
II. Phishing
III. Pharming
IV. Hacking
V. Hacktivism

A. Gaining unauthorized access to a computer system or network
B. Generally used to make a political statement
C. Criminal activity on the Internet
D. Messages designed to trick you
E. Redirects you to a phony website

C, D, E, A, B

Computer Science & Information Technology

You might also like to view...

Which of the following is not one of the three types of security testing?

a. High-level assessments b. Low-level assessments c. Network evaluations d. Penetration tests

Computer Science & Information Technology

Which of the following attributes is needed to indicate to the CLR that objects of the class can be serialized?

a) [Serializable] b) [DeSerializable] c) [Serialize] d) both a and b

Computer Science & Information Technology