Questions with Correct Detailed
Answers 2025-2026 Edition.
Computer Fraud - Answer unauthorized use of computer data for personal gain such as
transferring money from another's account or charging purchases to someone else's account
Spyware - Answer software that secretly gathers information about users while they browse
the Web
Adware - Answer form of spyware that collects information about the user to display
advertisements in the Web browser
Phishing - Answer sending fraudulent e-mails that seem to come from legitimate sources
-spear phishing = targeted phishing
Pharming - Answer trick users to visit fraudulent web sites and provide private information
-real web sites can be hijacked
Keystroke Loggers - Answer -monitor and record keystrokes
-can be software or hardware devices sometimes used by companies to track employees' use of
e-mail and the Internet
-can be used for malicious purposes
Sniffing - Answer capturing and recording network traffic often used by hackers to intercept
information
Spoofing - Answer attempt to gain access to a network by posing as an authorized user to find
sensitive information
Ransomware - Answer stealing data and demand money for return
or encrypt data and demand money for key
, Black Hats - Answer specialized hackers, for profit, fun, political causes, social causes;
modify/destroy data
White Hats - Answer aka "Ethical Hackers", pentetration testers
What kind of tools do hackers use to break into computers and networks? - Answer -Sniffers,
password crackers, and rootkits
-Journals Phrack and 2600: The Hacker Quarterly
-dark web - untraceable web within the web; easy to hide illegal activity
Comprehensive Security System - Answer Protects an organization's resources (information
and computer and network equipment, e-mails, invoices transferred via electronic data
interchange (EDI), new product designs, marketing campaigns, and financial statements, etc.)
Security (CIA) - Answer -confidentiality
-integrity
-availability
Confidentiality - Answer system must not allow disclosing information to anyone who isn't
authorized to access it
Integrity - Answer ensures the accuracy of information resources in an organization
Availability - Answer ensures that computers and networks are operating and authorized users
can access the information they need
3 Levels of Security - Answer -Level 1 - front end servers
-Level 2 - back end servers
-Level 3 - corporate network
Fault-Tolerant System - Answer ensure availability in the event of a system failure by using a
combination of hardware and software