Multiple Choice
Cyber criminals gain information on a victim by monitoring online activities,accessing databases,and so on and make false accusations that damage the reputation of the victim on blogs,Web sites,chat rooms,or e-commerce sites.Such acts are called ________.
A) bot herding
B) cyberstalking
C) spam filtering
D) viral marketing
E) spear phishing
Correct Answer:

Verified
Correct Answer:
Verified
Q2: _ is the use of computer and
Q4: Ciscon Telecom is a mobile operator in
Q6: Detective controls are used to prevent any
Q50: _ refers to an organized attempt by
Q66: A hot backup site is an empty
Q69: Patents generally refer to creations of the
Q81: Explain various types of information systems controls.
Q92: Briefly explain cyberwar and cyberterrorism.
Q100: Briefly describe the concept of virtual private
Q102: Cyberwar refers to an organized attempt by