Which of the following is an example of an intentional unauthorized access or use?

A. Clicking a link in an e-mail that happens to contain malware
B. Installing a keylogger on a system in an attempt to collect usernames and passwords
C. Flooding a system with ping requests in an attempt to take it down
D. View medical records to satisfy one's curiosity

Answer: B
Explanation: Installing a keylogger to collect usernames and passwords is an example of an unauthorized access or use. Flooding a system with ping requests is an example of a denial-of-service attack. Viewing medical records for curiosity is an example of inappropriate use.

Computer Science & Information Technology

You might also like to view...

What are the different of methods of automation for the Audio Mixer?

What will be an ideal response?

Computer Science & Information Technology

POP3 is not useful if you do not have a permanent connection to a network and must dial in using a temporary Internet connection.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology