Computer securityVersión en línea This is... por Ri Llanes 1 _____________ method of bypassing normal authentication, securing illegal remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected a Backdoor b Trapdoor c phishing d Social Engineering 2 Is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication a Cookiejacking b BackDoor c TrapDoor d Phishing 3 _______is a system intended to enable online anonymity a Thor b Tor c Zeus d RedLine 4 Is mostly known as an attack vector for websites but can be used to attack any type of structured query language database a RADIX64 b md5 c Sql injection d Hijacking 5 Malware a is software that is available for use at no cost or for an optional fee b is software used or created by attackers to disrupt computer operatio c software is software used to prevent, detect and remove badware d a mechanism to produce the executable form of computer programs, such as machine code, in some automatic manner