Gaining unauthorised access to a system is called:
A) Hacking
B) Identity theft
C) Phishing
D) None of the options are correct.
Correct Answer:
Verified
Q21: Which of the following fraud can occur
Q22: In terms of IT,cookies cannot:
A)ensure the browser
Q23: Information privacy principles from the Privacy Act
Q24: In terms of IT,spam is a problem
Q25: The principles of the Privacy Act 1988
Q27: Which of the following factors is the
Q28: Which of the following controls can ensure
Q29: Privacy is:
A)A legal issue only.
B)An ethical issue
Q30: Some organisations restrict employee's access to external
Q31: Consumer profiling is less likely to be
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents