CIS 333 All Assignments CIS 333 All Assignments | Page 36

• Question 7 Prior to VoIP, attackers would use wardialers to ________. • Question 8 Black-hat hackers generally poke holes in systems, but do not attempt to disclose __________ they find to the administrators of those systems. • Question 9 A software program that collects information about Internet usage and uses it to present targeted advertisements to users is the definition of ________.