Multiple Choice
The unauthorized access to,and use of,computer systems is known as
A) hacking.
B) hijacking.
C) phreaking.
D) sniffing.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q6: Computer fraud perpetrators who use telephone lines
Q6: Which of the following would be least
Q10: The call to tech support was fairly
Q11: The unauthorized use of special system programs
Q12: Wally Hewitt is an accountant with a
Q13: Which of the following is not a
Q51: In the 1960s,techniques were developed that allowed
Q66: Illegally obtaining and using confidential information about
Q78: Describe the differences between a worm and
Q82: A fraud technique that allows a perpetrator