Multiple Choice
Helen downloaded a greeting card program from the internet.She was surprised that it really didn't do what it was supposed to do.What the program did was send nasty,profane e-mails to all the people in her contact list.Helen is the victim of ________.
A) spoofing
B) keyloggers
C) a Trojan horse
D) worms
Correct Answer:

Verified
Correct Answer:
Verified
Q7: A(n) _ examines the firm's overall security
Q23: In which method of encryption is a
Q27: Specific security challenges that threaten corporate servers
Q43: The WEP specification calls for an access
Q51: Daniel is sitting home one night and
Q54: The _ worm uses flaws in Windows
Q57: Smartphones share the same security weaknesses as
Q58: A firewall allows the organization to<br>A)enforce a
Q59: _ are specific controls unique to each
Q60: _ is the intentional disruption,defacement,or even destruction