Multiple Choice
_____ is the unauthorized use of system data for personal gain, such as transferring money from another's account or charging purchases to someone else's account.
A) Computer fraud
B) Denial-of-service
C) Keystroke logging
D) Social engineering
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q3: _ uses a public key known to
Q4: Which of the following statements is true
Q5: _ is a method of access control
Q6: An organization's comprehensive security plan should include
Q7: In the context of intentional computer and
Q9: If disaster strikes, which of the following
Q10: A(n)_ contains code intended to disrupt a
Q11: _ can interfere with users' control of
Q12: Which of the following is a biometric
Q13: Describe the three levels of security in