Identify five ways that hackers use to gain unauthorized access to systems
What will be an ideal response?
1. Cracking the password
2. Tricking someone
3. Network sniffing
4. Misusing administrative tools
5. Playing middleman
6. Denial of service
7. Trojan horse
8. Viruses
9. Spoofing
Business
You might also like to view...
Which of the following is least likely to help establish credibility?
A) Getting to know the audience B) Establish credentials C) Identify needs D) Present ideas effectively E) Tell the truth
Business
Annual bonus plans are long-term incentives, and stock options are short-term incentives
Indicate whether this statement is true or false.
Business