100%(4)4 out of 4 people found this document helpful
This preview shows page 1 - 3 out of 3 pages.
Question 40 out of 0 pointsHackers can be generalized into two skill groups: expert and ____________________.
Selected Answer:d. professionalAnswers:a. journeymanb. packet monkeyc. noviced. professionalQuestion 50 out of 0 pointsA device (or a software program on a computer) that can monitor data traveling on a network is known as asocketsniffers. _________________________Question 60 out of 0 pointsSome information gathering techniques are quite legal, for example, using a Web browser to perform market research. These legal techniques are called, collectively, competitive ____________________.Question 70 out of 0 pointsAn act of theft performed by a hacker falls into the category of “theft,” but is also often accompanied by defacement actions to delay discovery and thus may also be placed within the category of “forces of nature.”Question 80 out of 0 pointsWith the removal of copyright protection mechanisms, software can be easily distributed and installed.
Selected Answer:TrueAnswers:TrueFalseQuestion 90 out of 0 pointsThe application of computing and network resources to try every possible combination of options of a password is called a dictionaryattack. _________________________Question 100 out of 0 points____________________ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against noncombatant targets by subnational groups or clandestine agents.