Question: Match the computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used
.png)
1. Bluebugging 2. Bluesnarfing a. Intercepting Internet and other network transmissions b. E-mails instructing a user to call a phone number where they are asked to divulge personal information 3. Eavesdroping c. Searching for unprotected wireless networks in a vehicle 4. Evil twin d. Gaining access to a protected system by latching onto a legitimate user 5. Packet sfng 6. Phreaking ing and organizing captured network data f. Intercepting and/or listening in on private voice and data transmissions 7. PiggybackingDeep packet filtering 8. Vishing h. Searching for modems on unprotected phone lines in order to access the attached computer and gain access to the network(s) to which it is attached Making phone calls and sending text messages using another user's phone without physically holding that 9. War dialing i. one 10. War dving j Using telephone lines to transmit viruses and to access, steal, and destroy data k. Capturing data from devices that use Bluetooth technology L Devices that hide IP addresses m. A rogue wireless access point masquerading as a legitimate access point
Step by Step Solution
3.40 Rating (163 Votes )
There are 3 Steps involved in it
1 Bluebugging i Making phone calls and sending text messages using another users phone without phy... View full answer
Get step-by-step solutions from verified subject matter experts
Document Format (1 attachment)
373-B-A-I-S (4828).docx
120 KBs Word File
