Question: Match the computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used

Match the computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used once, more than once, or not atall.
Match the computer fraud and abuse technique in the left

1. Bluebugging 2. Bluesnarfing a. Intercepting Internet and other network transmissions b. E-mails instructing a user to call a phone number where they are asked to divulge personal information 3. Eavesdroping c. Searching for unprotected wireless networks in a vehicle 4. Evil twin d. Gaining access to a protected system by latching onto a legitimate user 5. Packet sfng 6. Phreaking ing and organizing captured network data f. Intercepting and/or listening in on private voice and data transmissions 7. PiggybackingDeep packet filtering 8. Vishing h. Searching for modems on unprotected phone lines in order to access the attached computer and gain access to the network(s) to which it is attached Making phone calls and sending text messages using another user's phone without physically holding that 9. War dialing i. one 10. War dving j Using telephone lines to transmit viruses and to access, steal, and destroy data k. Capturing data from devices that use Bluetooth technology L Devices that hide IP addresses m. A rogue wireless access point masquerading as a legitimate access point

Step by Step Solution

3.40 Rating (163 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

1 Bluebugging i Making phone calls and sending text messages using another users phone without phy... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Document Format (1 attachment)

Word file Icon

373-B-A-I-S (4828).docx

120 KBs Word File

Students Have Also Explored These Related Accounting Questions!