Which of the following is an example of an intentional unauthorized access or use?
A. Clicking a link in an e-mail that happens to contain malware
B. Installing a keylogger on a system in an attempt to collect usernames and passwords
C. Flooding a system with ping requests in an attempt to take it down
D. View medical records to satisfy one's curiosity
Answer: B
Explanation: Installing a keylogger to collect usernames and passwords is an example of an unauthorized access or use. Flooding a system with ping requests is an example of a denial-of-service attack. Viewing medical records for curiosity is an example of inappropriate use.
You might also like to view...
What are the different of methods of automation for the Audio Mixer?
What will be an ideal response?
POP3 is not useful if you do not have a permanent connection to a network and must dial in using a temporary Internet connection.
Answer the following statement true (T) or false (F)