Author Question: Bob, a hacker, encountered a vulnerability in a bank's firewall when he was trying to hackinto its ... (Read 52 times)

sabina

  • Hero Member
  • *****
  • Posts: 563
Bob, a hacker, encountered a vulnerability in a bank's firewall when he was trying to hackinto its Web site. Which of the following can Bob use to take advantage of this liability?
 
  A) exploit
  B) attack vector
  C) carding
  D) wardriver

Question 2

A group of hackers use a targeted phishing attack to breach a company's firewalls and hackinto its security system. Which of the following techniques have the hackers used?
 
  A) pretexting
  B) IP spoofing
  C) spear phishing
  D) phone phishing

Question 3

A procedure is a component of an information system and is embedded within a processactivity.
 
  Indicate whether the statement is true or false



mohan

  • Sr. Member
  • ****
  • Posts: 362
Answer to Question 1

I can not tell you how much you just made me happyTHX. You rock

Answer to Question 2

Many thanks to you.

Answer to Question 3

TRUE



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

On average, someone in the United States has a stroke about every 40 seconds. This is about 795,000 people per year.

Did you know?

There are more nerve cells in one human brain than there are stars in the Milky Way.

Did you know?

Alcohol acts as a diuretic. Eight ounces of water is needed to metabolize just 1 ounce of alcohol.

Did you know?

Persons who overdose with cardiac glycosides have a better chance of overall survival if they can survive the first 24 hours after the overdose.

Did you know?

There are 20 feet of blood vessels in each square inch of human skin.

For a complete list of videos, visit our video library