A ___________ is a software program that performs one of two functions: brute-force
password attack to gain unauthorized access to a system, or recovery of passwords stored in a
computer system.
•
Question 7
Prior to VoIP, attackers would use wardialers to ________.
•
Question 8
Black-hat hackers generally poke holes in systems, but do not attempt to disclose
__________ they find to the administrators of those systems.
•
Question 9
A software program that collects information about Internet usage and uses it to
present targeted advertisements to users is the definition of ________.