Author Question: Bob, a hacker, encountered a vulnerability in a bank's firewall when he was trying to hackinto its ... (Read 22 times)

sabina

  • Hero Member
  • *****
  • Posts: 563
Bob, a hacker, encountered a vulnerability in a bank's firewall when he was trying to hackinto its Web site. Which of the following can Bob use to take advantage of this liability?
 
  A) exploit
  B) attack vector
  C) carding
  D) wardriver

Question 2

A group of hackers use a targeted phishing attack to breach a company's firewalls and hackinto its security system. Which of the following techniques have the hackers used?
 
  A) pretexting
  B) IP spoofing
  C) spear phishing
  D) phone phishing

Question 3

A procedure is a component of an information system and is embedded within a processactivity.
 
  Indicate whether the statement is true or false



mohan

  • Sr. Member
  • ****
  • Posts: 362
Answer to Question 1

I can not tell you how much you just made me happyTHX. You rock

Answer to Question 2

Many thanks to you.

Answer to Question 3

TRUE



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

In the United States, congenital cytomegalovirus causes one child to become disabled almost every hour. CMV is the leading preventable viral cause of development disability in newborns. These disabilities include hearing or vision loss, and cerebral palsy.

Did you know?

Limit intake of red meat and dairy products made with whole milk. Choose skim milk, low-fat or fat-free dairy products. Limit fried food. Use healthy oils when cooking.

Did you know?

Carbamazepine can interfere with the results of home pregnancy tests. If you are taking carbamazepine, do not try to test for pregnancy at home.

Did you know?

Acetaminophen (Tylenol) in overdose can seriously damage the liver. It should never be taken by people who use alcohol heavily; it can result in severe liver damage and even a condition requiring a liver transplant.

Did you know?

The immune system needs 9.5 hours of sleep in total darkness to recharge completely.

For a complete list of videos, visit our video library