You are on page 1of 1

1.

Secretly changing an already open browser tab  Tabnapping


2. Using social networking to harass another person  Cyber Bullying
3. Unauthorized access, alteration or use of an electronic device or component of an information
technology system  Hacking
4. It uses email messages to send junk messages  Email Spam
5. Use to hide the presence of trap doors, sniffers, and key loggers; conceal software that
originates a dos or an e-mail spam attack; and access user names and log in information  Key
Logging /// Rootkit
6. Break into system’s defense, steal the file containing valid passwords, decrypt them, and use
them to access programs, files and data  Password Cracking
7. Making an email look like it came from someone else  Spoofing
8. Threatens to harm business or an individual if a specific amount is not provided  Cyber
Extortion
9. 9.
10. 9
11. 9
12. 9
13. 9
14. 9
15. 9
16. Cross Site Scripting is an attack between the time a new software vulnerability is discovered and
the time a software developer releases a patch that fixes the problem  False
17. Looking for unsecured wireless networks in a vehicle  War Driving
18. Using the internet to disrupt e-commerce and communications  Internet Terrorism
19. Using an invented scenario to gain confidential information  Pretexting
20. This is an attack on the telephone system for the purpose of maiking toll-free telephone call 
Phising
21. Unauthorized copying or distribution of copyrighted software  Software Piracy
22. Unauthorized use of special system programs to bypass regular system controls 
Superzapping

1. Allows user to override regular system orders  Trap Door


2. It disrupts your internet activity which targets your data and commits crimes  Denial of
Service
3. It is the embezzlement of a small amount of funds.
4. This happens when the amount of data exceeds its capacity, causing the code or system to
overwrite  Buffer Overflow Attack

You might also like