Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

60. A-- is a person or organization that seeks to obtain data or other assets illegally. without the owner's permission and often without the owner's

image text in transcribed
60. A-- is a person or organization that seeks to obtain data or other assets illegally. without the owner's permission and often without the owner's knowledge A) target B) vulnerability C) threat D) waming 61. Which of the following is considered a computer crime? A) internal software bug deleting customer records B) poorly written programs resulting in data losses C) loss of data as a result of flooding D) hacking of information systems 62, occurs when someone deceives by pretending to be someone else. A) Hacking B) Baiting C) Sniffing D) Pretexting 63. Apretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth. A) hacker B) phisher C) safeguard D) sniffer 64. occurs through human error when employees do not follow proper procedures or when procedures have not been well designed. A) Unauthorized data disclosure B) Incorrect data modification C) Denial of service D) Loss of infrastructure 65. present the largest risk for an organization's infrastructure loss A) Employees B) Natural disasters C) Hackers D) Competitors 66. are small files that your browser stores on your computer when vou visit Weh sites

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions