1. A hacker from Croatia inserted a malicious string of code in a popular news web- site's database. When a researcher from a financial institution requested a page from the website, it was sent along with the malicious string. The researcher's browser ex- ecuted the string inside the response and sent the researcher's cookies to the hacker The hacker used the cookies to impersonate the researcher. What computer fraud approach did the hacker use to obtain the cookies? a. man-in-the middle attack b. cross-site scripting attack c. hijacking attack d. buffer overflow attack e. impersonation 2. When your cell phone dies, a nodding acquaintance gives you a USB wall charger. Un- beknownst to you, this device can eavesdrop on most wireless Microsoft keyboards. To which computer fraud and abuse technique could this device expose you to? a. packet sniffer b. Trojan horse c. keylogger d. back door e. ransomware 3. Sanford Wallace sent phishing messages to Facebook users that tricked 500,000 of them into providing their passwords and user account information. He accessed their accounts and over a three-month period posted more than 27 million messages on their friends' timelines. Since he violated a court order to not access Facebook, he was sentenced to 30 months in jail. Wallace went to jail for which kind of attack? a. SQL injection b. buffer overflow c. podslurping d. phreaking e. Spamming 4. After experiencing a larger than usual number of credit card frauds, the bank issuing the cards was able to determine that most of the credit cards had been used in only one locationa restaurant in New York City. An investigation uncovered a waiter who was double swiping credit cards and using the captured data to make online pur- chases where a physical card was not required. This is an example of a. skimming b. chipping c. piggybacking d. eavesdropping e OP