Multiple Choice
Gaining control of someone else's computer to carry out illicit activities without the user's knowledge
A) Hacking
B) Hijacking
C) Phreaking
D) Sniffing
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q12: Wally Hewitt is an accountant with a
Q33: Tapping into a communications line and then
Q51: In the 1960s,techniques were developed that allowed
Q65: A _ is similar to a _,except
Q75: What are the two kinds of fraud
Q78: How can companies reduce losses from fraud?<br>
Q81: In many cases of fraud,the _ takes
Q82: How does a company make fraud less
Q83: A set of unauthorized computer instructions in
Q84: A majority of fraud perpetrators are<br>A)outsiders.<br>B)employees.<br>C)computer hackers.<br>D)vendors.