Author Question: Bob, a hacker, encountered a vulnerability in a bank's firewall when he was trying to hackinto its ... (Read 76 times)

sabina

  • Hero Member
  • *****
  • Posts: 563
Bob, a hacker, encountered a vulnerability in a bank's firewall when he was trying to hackinto its Web site. Which of the following can Bob use to take advantage of this liability?
 
  A) exploit
  B) attack vector
  C) carding
  D) wardriver

Question 2

A group of hackers use a targeted phishing attack to breach a company's firewalls and hackinto its security system. Which of the following techniques have the hackers used?
 
  A) pretexting
  B) IP spoofing
  C) spear phishing
  D) phone phishing

Question 3

A procedure is a component of an information system and is embedded within a processactivity.
 
  Indicate whether the statement is true or false



mohan

  • Sr. Member
  • ****
  • Posts: 362
Answer to Question 1

I can not tell you how much you just made me happyTHX. You rock

Answer to Question 2

Many thanks to you.

Answer to Question 3

TRUE



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

The average adult has about 21 square feet of skin.

Did you know?

Amphetamine poisoning can cause intravascular coagulation, circulatory collapse, rhabdomyolysis, ischemic colitis, acute psychosis, hyperthermia, respiratory distress syndrome, and pericarditis.

Did you know?

The training of an anesthesiologist typically requires four years of college, 4 years of medical school, 1 year of internship, and 3 years of residency.

Did you know?

On average, someone in the United States has a stroke about every 40 seconds. This is about 795,000 people per year.

Did you know?

In inpatient settings, adverse drug events account for an estimated one in three of all hospital adverse events. They affect approximately 2 million hospital stays every year, and prolong hospital stays by between one and five days.

For a complete list of videos, visit our video library