Multiple Choice
Using a small device with storage capacity (iPod,Flash drive) to download unauthorized data from
A computer is called
A) masquerading.
B) bluebugging.
C) eavesdropping.
D) podslurping.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q69: Hunter Carr is an accountant with AcctSmart.The
Q70: In November of 2005 it was discovered
Q71: What is a SQL injection attack?<br>A)It is
Q72: Ashley Baker works in the information technology
Q73: Computers that are part of a botnet
Q75: Social engineering is<br>A)verifying credit card validity;buying and
Q76: What is social engineering? Provide an example.
Q77: Describe ways to help minimize social engineering.
Q78: Describe the differences between a worm and
Q79: Individuals who control an army of malware-infected