Match the following terms with their description
I. Cybercrime
II. Phishing
III. Pharming
IV. Hacking
V. Hacktivism
A. Gaining unauthorized access to a computer system or network
B. Generally used to make a political statement
C. Criminal activity on the Internet
D. Messages designed to trick you
E. Redirects you to a phony website
C, D, E, A, B
Computer Science & Information Technology
You might also like to view...
Which of the following is not one of the three types of security testing?
a. High-level assessments b. Low-level assessments c. Network evaluations d. Penetration tests
Computer Science & Information Technology
Which of the following attributes is needed to indicate to the CLR that objects of the class can be serialized?
a) [Serializable] b) [DeSerializable] c) [Serialize] d) both a and b
Computer Science & Information Technology