Which of the following is most likely to install a "backdoor" internet connection?
Trojan
Virus
Worm
Adware
Which OS listed below is specifically developed for a hackers use?
Solaris
Ubuntu
BackTrack
Windows
You have entered www.google.com in the URL and page is redirected to www.yahoo.com. In this scenario you have been _________________.
IP Spoofed
DNS Spoofed
Email Spoofed
Packet Spoofed
Hackers often gain entry to a network be pretending to be at a legitimate computer.
Phishing
Forging
ID Theft
IP Spoofing
Kevin and his friends are going through a local IT firm's garbage. Which of the following best describes this activity?
Reconnaissance
Intelligence Gathering
Social Engineering
Dumpster Diving