CIS 333 All Assignments CIS 333 All Assignments | Page 36
•
Question 7
Prior to VoIP, attackers would use wardialers to ________.
•
Question 8
Black-hat hackers generally poke holes in systems, but do not attempt to disclose
__________ they find to the administrators of those systems.
•
Question 9
A software program that collects information about Internet usage and uses it to
present targeted advertisements to users is the definition of ________.