Computer Fraud and Abuse Techniques.
Match the computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used once, more than once, or not at all.
___ 1. Dictionary attack | a. Special software used to bypass system controls |
___ 2. Hacking | b. A segment of executable code that attaches itself to software |
___ 3. Logic bomb | c. Capturing and decrypting passwords to gain access to a system |
___ 4. Malware | d. Malicious computer code that specifically targets a computer’s start-up instructions |
___ 5. Masquerading | e. Using a wireless network without permission |
___ 6. Password cracking | f. Covertly swiping a credit card in a card reader that records the data for later use |
___ 7. Piggybacking | g. Concealing data within a large MP3 file |
___ 8. Posing | h. Attack occurring between the discovery of a software vulnerability and the release of a patch to fix the problem |
___ 9. Pretexting | i. Entering a system using a back door that bypasses normal system controls |
___ 10. Rootkit | j. Using software to guess company addresses, send employees blank e-mails, and add unreturned messages to spammer e-mail lists |
___ 11. Shoulder surfing | k. Unauthorized code in an authorized and properly functioning program |
___ 12. Skimming | l. Software used to do harm |
___ 13. Social engineering | m. A program that can replicate itself and travel over networks |
___ 14. Software piracy | n. Pretending to be a legitimate user, thereby gaining access to a system and all the rights and privileges of the legitimate user |
___ 15. Steganography | o. Special code or password that bypasses security features |
___ 16. Superzapping | p. Unauthorized copying or distribution of copyrighted software |
___ 17. Trap door | q. Software that conceals processes, files, network connections, and system data from the operating system and other programs |
___ 18. Trojan horse | r. Methods used to trick someone into divulging personal information |
___ 19. Virus | s. Software that sits idle until a specified circumstance or time triggers it |
___ 20. Worm | t. The act of duplicating software, music, or movies |
___ 21. Zero-day attack | u. Acting under false pretenses to gain confidential information |
v. Observing or listening to users as they divulge personal information | |
w. Gaining access to a computer system without permission | |
x. Creating a seemingly legitimate business, collecting personal information while making a sale, and never delivering the item sold |
We need at least 10 more requests to produce the solution.
0 / 10 have requested this problem solution
The more requests, the faster the answer.