Computer Fraud and Abuse Techniques.
Match the computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used once, more than once, or not at all.
___ 1. Bluebugging | a. Intercepting Internet and other network transmissions |
___ 2. Bluesnarfing | b. E-mails instructing a user to call a phone number where they are asked to divulge personal information |
___ 3. Eavesdropping | c. Searching for unprotected wireless networks in a vehicle |
___ 4. Evil twin | d. Gaining access to a protected system by latching onto a legitimate user |
___ 5. Packet sniffing | e. Decoding and organizing captured network data |
___ 6. Phreaking | f. Intercepting and/or listening in on private voice and data transmissions |
___ 7. Piggybacking | g. Deep packet filtering |
___ 8. Vishing | h. Searching for modems on unprotected phone lines in order to access the attached computer and gain access to the network(s) to which it is attached |
___ 9. War dialing | i. Making phone calls and sending text messages using another user’s phone without physically holding that phone |
___ 10. War driving | j. Using telephone lines to transmit viruses and to access, steal, and destroy data |
k. Capturing data from devices that use Bluetooth technology | |
l. Devices that hide IP addresses | |
m. A rogue wireless access point masquerading as a legitimate access point |
We need at least 10 more requests to produce the solution.
0 / 10 have requested this problem solution
The more requests, the faster the answer.