Author Question: Bob, a hacker, encountered a vulnerability in a bank's firewall when he was trying to hackinto its ... (Read 78 times)

sabina

  • Hero Member
  • *****
  • Posts: 563
Bob, a hacker, encountered a vulnerability in a bank's firewall when he was trying to hackinto its Web site. Which of the following can Bob use to take advantage of this liability?
 
  A) exploit
  B) attack vector
  C) carding
  D) wardriver

Question 2

A group of hackers use a targeted phishing attack to breach a company's firewalls and hackinto its security system. Which of the following techniques have the hackers used?
 
  A) pretexting
  B) IP spoofing
  C) spear phishing
  D) phone phishing

Question 3

A procedure is a component of an information system and is embedded within a processactivity.
 
  Indicate whether the statement is true or false



mohan

  • Sr. Member
  • ****
  • Posts: 362
Answer to Question 1

I can not tell you how much you just made me happyTHX. You rock

Answer to Question 2

Many thanks to you.

Answer to Question 3

TRUE



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

In 2010, opiate painkllers, such as morphine, OxyContin®, and Vicodin®, were tied to almost 60% of drug overdose deaths.

Did you know?

There are 60,000 miles of blood vessels in every adult human.

Did you know?

Thyroid conditions cause a higher risk of fibromyalgia and chronic fatigue syndrome.

Did you know?

Studies show that systolic blood pressure can be significantly lowered by taking statins. In fact, the higher the patient's baseline blood pressure, the greater the effect of statins on his or her blood pressure.

Did you know?

Patients should never assume they are being given the appropriate drugs. They should make sure they know which drugs are being prescribed, and always double-check that the drugs received match the prescription.

For a complete list of videos, visit our video library