Sovi.AI - AI Math Tutor

Scan to solve math questions

QUESTION IMAGE

13) a person with unlawful access to networks to steal and corrupt info…

Question

  1. a person with unlawful access to networks to steal and corrupt information and data is called

a) zombie
b) hacker
c) snoop
d) trespasser

  1. which of these would be deemed a cybercrime?

a) spam
b) adware
c) 3rd party cookies
d) data manipulation

  1. breaking into a computer system (hacking), for politically or socially purposes is called

a) digi - terrorism
b) adwaru
c) hacktivism
d) activism

  1. unlike phishing that uses fake e - mails to gain personal information about a user, ____ uses fake websites to gain personal information.

a) spoofing
b) trolling
c) pharming
d) farming

  1. the malevolent use of computer code to change a computer or networks normal operation is called a(n) ____.

a) app
b) cyberattack
c) cyber - threat
d) cyber - intruder

  1. a(n) ____ logger is a form of spyware that records your keyboard strokes.

a) keystroke
b) input
c) touch
d) command

Explanation:

Brief Explanations
  1. Hackers are individuals with unauthorized access to networks to steal and corrupt information.
  2. Data manipulation is a form of cybercrime as it involves unauthorized changing of data.
  3. Hacktivism refers to hacking for political or social purposes.
  4. Pharming uses fake websites to obtain personal information.
  5. A cyber - attack is the malicious use of computer code to disrupt normal operations.
  6. A keystroke logger is a type of spyware that records keyboard strokes.

Answer:

  1. B. hacker
  2. D. data manipulation
  3. C. hacktivism
  4. C. pharming
  5. B. cyberattack
  6. A. keystroke