Multiple Choice
________ consists of activities that violate a company's IT use policies or ethics policies.
A) Fraud
B) Extortion
C) Hacking
D) Abuse
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q23: Carding is more serious than identity theft.
Q24: Traditional hackers are motivated by _.<br>A) thrill<br>B)
Q25: A Trojan horse is a program that
Q26: Mobile code usually is delivered through _.<br>A)
Q27: Sending packets with false IP source addresses
Q29: Cybercriminals avoid black market forums.
Q30: When a company visits a website to
Q31: Attackers cannot use IP address spoofing in
Q32: You receive an e-mail that seems to
Q33: Downloading pornography can lead to sexual harassment