Multiple Choice
When information gatherers employ techniques that cross a legal or ethical threshold, they are conducting __________.
A) industrial espionage
B) competitive intelligence
C) opposition research
D) hostile investigation
Correct Answer:

Verified
Correct Answer:
Verified
Q64: A number of technical mechanisms-digital watermarks and
Q65: An advance-fee fraud attack involves the interception
Q66: A(n) _ is a malicious program that
Q67: Acts of _ can lead to unauthorized real
Q68: Attacks conducted by scripts are usually unpredictable.
Q70: Attempting to reverse-calculate a password is called
Q71: The term <u>phreaker</u> is now commonly associated
Q72: Forces of nature, sometimes called acts of
Q73: In the _ attack, an attacker monitors (or sniffs)
Q74: _ is unsolicited commercial e-mail.