Multiple Choice
Gaining unauthorised access to a system is called:
A) Hacking
B) Identity theft
C) Phishing
D) None of the options are correct.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q44: Which principle is the foundation for phishing
Q45: There are three risk factors known as
Q46: In terms of IT,cookies cannot:<br>A)ensure the browser
Q47: Which of the following is not a
Q48: People are more likely to provide personal
Q50: Which of the following statements regarding Kantianism
Q51: When submitting their online registration form,a pop-up
Q52: The implicit rules that guide us in
Q53: Which of the following factors is the
Q54: Which of the following is not a