Author Question: Bob, a hacker, encountered a vulnerability in a bank's firewall when he was trying to hackinto its ... (Read 77 times)

sabina

  • Hero Member
  • *****
  • Posts: 563
Bob, a hacker, encountered a vulnerability in a bank's firewall when he was trying to hackinto its Web site. Which of the following can Bob use to take advantage of this liability?
 
  A) exploit
  B) attack vector
  C) carding
  D) wardriver

Question 2

A group of hackers use a targeted phishing attack to breach a company's firewalls and hackinto its security system. Which of the following techniques have the hackers used?
 
  A) pretexting
  B) IP spoofing
  C) spear phishing
  D) phone phishing

Question 3

A procedure is a component of an information system and is embedded within a processactivity.
 
  Indicate whether the statement is true or false



mohan

  • Sr. Member
  • ****
  • Posts: 362
Answer to Question 1

I can not tell you how much you just made me happyTHX. You rock

Answer to Question 2

Many thanks to you.

Answer to Question 3

TRUE



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Blood is approximately twice as thick as water because of the cells and other components found in it.

Did you know?

The Food and Drug Administration has approved Risperdal, an adult antipsychotic drug, for the symptomatic treatment of irritability in children and adolescents with autism. The approval is the first for the use of a drug to treat behaviors associated with autism in children. These behaviors are included under the general heading of irritability and include aggression, deliberate self-injury, and temper tantrums.

Did you know?

Limit intake of red meat and dairy products made with whole milk. Choose skim milk, low-fat or fat-free dairy products. Limit fried food. Use healthy oils when cooking.

Did you know?

The average office desk has 400 times more bacteria on it than a toilet.

Did you know?

The immune system needs 9.5 hours of sleep in total darkness to recharge completely.

For a complete list of videos, visit our video library