QUESTION IMAGE
Question
- a person with unlawful access to networks to steal and corrupt information and data is called
a) zombie
b) hacker
c) snoop
d) trespasser
- which of these would be deemed a cybercrime?
a) spam
b) adware
c) 3rd party cookies
d) data manipulation
- breaking into a computer system (hacking), for politically or socially purposes is called
a) digi - terrorism
b) adwaru
c) hacktivism
d) activism
- unlike phishing that uses fake e - mails to gain personal information about a user, ____ uses fake websites to gain personal information.
a) spoofing
b) trolling
c) pharming
d) farming
- the malevolent use of computer code to change a computer or networks normal operation is called a(n) ____.
a) app
b) cyberattack
c) cyber - threat
d) cyber - intruder
- a(n) ____ logger is a form of spyware that records your keyboard strokes.
a) keystroke
b) input
c) touch
d) command
Brief Explanations
- Hackers are individuals with unauthorized access to networks to steal and corrupt information.
- Data manipulation is a form of cybercrime as it involves unauthorized changing of data.
- Hacktivism refers to hacking for political or social purposes.
- Pharming uses fake websites to obtain personal information.
- A cyber - attack is the malicious use of computer code to disrupt normal operations.
- A keystroke logger is a type of spyware that records keyboard strokes.
Snap & solve any problem in the app
Get step-by-step solutions on Sovi AI
Photo-based solutions with guided steps
Explore more problems and detailed explanations
- B. hacker
- D. data manipulation
- C. hacktivism
- C. pharming
- B. cyberattack
- A. keystroke