Podcast
Questions and Answers
What is the term for the use of someone else’s identity?
What is the term for the use of someone else’s identity?
- Cybercrime
- Internet Fraud
- ATM Fraud
- Identity Theft (correct)
What type of malware attaches itself to other programs?
What type of malware attaches itself to other programs?
- Steganography
- Phishing
- Computer Viruses (correct)
- Denial of Service Attack
What is the technique of hiding data within an ordinary, non-secret file or message to avoid detection?
What is the technique of hiding data within an ordinary, non-secret file or message to avoid detection?
- Steganography (correct)
- Phishing
- Spam
- File Sharing and Piracy
What is the unlawful copying of software without authorization?
What is the unlawful copying of software without authorization?
What is the type of cyber attack in which a malicious actor aims to render a computer or other device inaccessible?
What is the type of cyber attack in which a malicious actor aims to render a computer or other device inaccessible?
Flashcards are hidden until you start studying