The practice of forging a return address on an e‐mail so that the recipient is fooled into
revealing private information is termed?
a. hacking
b. cracking
c. dumpster diving
d. spoofing

1 Answer

Answer :

d. spoofing

Related questions

Description : A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called? a. Phishing b. Carding c. Brand spoofing d. All of the above

Last Answer : d. All of the above

Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : b. Public key encryption

Description : The common name for the crime of stealing - passwords is a. Hacking b. Spoofing c. Identity theft d. Cracking

Last Answer : b. Spoofing

Description : 8. The common name for the crime of stealing passwords is a. Hacking b. Spoofing c. Identity theft d. Cracking

Last Answer : b. Spoofing

Description : Which of the following is not a common approach to phishing? a. Send an official-looking e-mail asking for confidential information b. Ask people to fill out and return a fake letter using postal mail ... open a submission form on a web page d. All of the above are uncommon approaches to phishing

Last Answer : b. Ask people to fill out and return a fake letter using postal mail

Description : Which one is a logical threat? a. Hacking b. Storm c. Phishing d. None of the above

Last Answer : a. Hacking

Description : Which one is not a physical threat? a. Hacking b. Storm c. Phishing d. None of the above

Last Answer : a. Hacking

Description : What sends work assignments through an e‐mail system? a. Database‐based enterprise information portal b. Messaging‐based enterprise information portal c. Database‐based workflow system d. Messaging‐based workflow system

Last Answer : d. Messaging‐based workflow system

Description : The local swelling of a finished plaster, is termed (A) Cracking (B) Dubbing (C) Blistering (D) Hacking

Last Answer : Answer: Option C

Description : Secure Sockets Layers does which of the following? a. creates a secure, private connection to a web server b. encrypts information c. sends information over the internet d. all of the above

Last Answer : d. all of the above

Description : Have you ever gone dumpster diving?

Last Answer : Oh hell yeah! It's mind boggling the perfectly good things that people throw out. I used to work next door to a furniture store. They'd throw brand new mattresses, literally still wrapped in ... the same thing. They're letting their imagination run away with them instead of looking at the reality.

Description : What’s the coolest thing you’ve found while dumpster diving?

Last Answer : Gosh….Brand new, still-in-the-plastic mattresses. Not the coolest thing (still thinking about that) but certainly the most valuable.

Description : Dumpster diving; have you done it? Would you do it?

Last Answer : answer:I have a couple times. With my hippie aunt, at work where it's not food, just books and cd's, and a business where I know the owner. I'm such a tightwad I can't resist free good ... brand-new pink scooter with ribbons and everything for a little girl who was poor, and it was a huge hit.

Description : Why do authorities care about dumpster diving?

Last Answer : I don’t know. I don’t see what the problem is with taking someone’s trash. They obviously don’t want it. If you do, what’s the problem?

Description : Would you ever consider Dumpster Diving?

Last Answer : I do it. Dumpsters at house clean outs and stuff put alongside the road for trash pickup. Where I live many people put their good trash out early so that other folks have a chance to get it before it ... Why have it in a landfill when someone else can use it? As for food from a dumpster, no way.

Description : "Dumpster Diving" : Have you ever done it, and did you find anything really cool?

Last Answer : I have. My old computer come out of the trash. A company decided to trash it after buying a new one. Nothing was wrong with it, just needed a little cleaning up and it ran like new.

Description : What are the dumpster diving laws in KS?

Last Answer : Need answer

Description : What are the laws in place for dumpster diving in Georgia?

Last Answer : That issue is covered locally. You need to check your town ordinances. Generally, if the dumpster is on private property you may be accused of trespassing. The owner can call the police.You can check your municipal code at the link:https://library.municode.com

Description : Is dumpster diving legal in Indiana?

Last Answer : Need answer

Description : What are the laws in place for dumpster diving in Georgia?

Last Answer : That issue is covered locally. You need to check your town ordinances. Generally, if the dumpster is on private property you may be accused of trespassing. The owner can call the police.You can check your municipal code at the link:https://library.municode.com

Description : The common name for the crime of stealing passwords is i) Jacking ii) Identify Theft iii) Spoofing iv) Hacking

Last Answer : iii) Spoofing

Description : A kind of impersonation in order to get access to other computers is__________ A. Hacking B. Spam C. Phishing D. Spoofing

Last Answer : D. Spoofing

Description : Illegal intrusion of a computer system without authorization of the owner or user is__________ A. Hacking B. Spam C. Phishing D. Spoofing

Last Answer : A. Hacking

Description : Which of the following an accurate statement about internet phone calls? a. They are possible but not yet free b. They are not possible c. They are currently standard practice d. None of the above is an accurate statement about internet phone calls

Last Answer : a. They are possible but not yet free

Description : Digital signature is a a. Digital id,send as an attachment to a web page/e‐mail/message b. Is used for verifying the attachments send using web c. Both a and b d. None of these

Last Answer : c. Both a and b

Description : Unsolicited e‐mail is called what? a. Junk mail b. Spam c. Extra mail d. None of the above

Last Answer : b. Spam

Description : E‐mail messages may be stored on which of the following computers? a. Sender's computer b. Sender's server c. Recipient's server d. All of the above

Last Answer : d. All of the above

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Private key b. Symmetric c. Asymmetric d. None

Last Answer : c. Asymmetric

Description : Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Public key b. Symmetric c. Asymmetric d. None

Last Answer : b. Symmetric

Description : Secret key is used for a. Public key cryptography b. Private key cryptography c. Asymmetric key cryptography d. None of these

Last Answer : b. Private key cryptography

Description : What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : d. None of the above

Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private

Last Answer : d. public, private

Description : What are the two parts of an E - mail address? a) User Name and Street Address b) Legal Name and Phone Number c) User Name and Domain Name d) Initials and Password e) User Name and Recipient Name

Last Answer : c) User Name and Domain Name

Description : . After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : Who breaks into other people's computer systems and steals and destroys information? a. Hackers b. softwares c. Hacktivists d. Script kiddies

Last Answer : a. Hackers

Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange

Last Answer : d. electronic data interchange

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : Companies can gather information about employees and potential employees from which of the following places? a. Job applications b. Credit reports c. Companies that track Web surfers d. All of the above

Last Answer : d. All of the above

Description : Which of the following examines information passing through switches, hubs, or routers? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures

Last Answer : b. Packet sniffer

Description : Which of the following is not a dimension of privacy? a. Need for personal space b. Need to feel in control of our possessions c. Need to feel in control of our personal information d. All of the above are dimensions of privacy

Last Answer : d. All of the above are dimensions of privacy

Description : Which is the most important component of IT? a. Information b. People c. Information technology d. Computers

Last Answer : b. People

Description : What is the process of making a copy of the information stored on a computer? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : a. Backup

Description : What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know ... about? a. Web log b. Clickstream c. Anonymous Web browsing service d. None of the above

Last Answer : d. None of the above