Identify five ways that hackers use to gain unauthorized access to systems

What will be an ideal response?

1. Cracking the password
2. Tricking someone
3. Network sniffing
4. Misusing administrative tools
5. Playing middleman
6. Denial of service
7. Trojan horse
8. Viruses
9. Spoofing

Business

You might also like to view...

Which of the following is least likely to help establish credibility?

A) Getting to know the audience B) Establish credentials C) Identify needs D) Present ideas effectively E) Tell the truth

Business

Annual bonus plans are long-term incentives, and stock options are short-term incentives

Indicate whether this statement is true or false.

Business