A process of sending high volume of requests to a system so the system cannot hand legitimate users is called…….
a) data diddling
b) zapping
c) denial of service
d) bombing
A program placed for legitimate program for unauthorized and hidden access to system is called……
a) worm
b) worm
c) trapdoor
d) bomb
If a legitimate user does not log off from system, an illegitimate user may be involved…
a) piggy backing
b) zapping
c) scavenging
d) trapdoor
Zapping software is used for…….
a) bypass security system
b) checking virus on system
c) destroy sensitive data
d) none of these
A technique to get small amount of money illegally from large
financial system is…….
a) salami
b)
piggybacking
c) zapping
d)
data dadding
A process of searching trash cans to find credit card or bank account numbers for illegitimate use is called…….
a) scavenging
b) trap door
c) data diddling
d) zapping