21) Phishing refers to the ________. A) attempts to trick financial account and credit card holders into giving away their authorization information B) process of causing system instability or system crashes to steal information from client computers across a network C) practice of providing free software paid for by advertisements appearing during the use of the software D) act of flooding customers with unwanted information, images, and other marketable information E) process of installing a software in the customers’ browser to extract personal information of users 22) Which of the following is a message passed to a Web browser on a user’s computer by a Web server? A) cookie B) botnet C) honeypot D) spim E) spam 23) When using Yahoo Messenger, you get an unsolicited advertisement from a company. This advertisement contained a link to connect to the merchant’s Web site. Which of the following is the best way of classifying this advertisement? A) Adware B) Cookie C) Internet hoax D) Spim E) cyber squat 24) Which of the following is the most accurate definition of a botnet? A) group of hackers working together to obtain unauthorized access to a system or network B) spider software used by a search algorithm to crawl various Web sites to return a query C) group of destructive softwares working independently to achieve a common goal D) a common platform used by search engines to index the contents of a Web site E) destructive software robots, working together on a collection of zombie computers via the Internet 25) A hacker takes an individual’s social security number, credit card number, and other personal information for the purpose of using the victim’s credit rating to borrow money, buy merchandise, and otherwise run up debts that are never repaid. This practice is called ________. A) identity theft B) cyberstalking C) cyberbullying D) internet spamming E) internet hoaxing 26) ________ are false messages often circulated online about new viruses, earthquakes ; kids in trouble; cancer causes; or any other topic of public interest. A) Internet hoaxes B) Honeypots C) Cookies D) Logic bombs E) Malware 27) Arbitron consultants, a leading software consulting firm in the United States, decide to launch ERP an ERP Solution. The company chooses the brand name ArbitEnterprise for the new solution. However, when the company attempted to register the domain name, it found that the domain name was registered to an unknown firm. The small firm is now attempting to sell the domain name to Arbitron. Which of the following terms refers to this practice of buying a domain name only to sell it for big bucks? A) cybersquatting B) logic bombing C) cyberbullying D) hot backing up E) cyberstalking 28) Identify the term that represents the dubious practice of registering a domain name and then trying to sell the name for big bucks to the person, company, or organization most likely to want it. A) cybersquatting B) cyberstalking C) cyberbullying D) cyberwar E) cyberharassment 29) Cyber criminals gain information on a victim by monitoring online activities, accessing databases, and so on and make false accusations that damage the reputation of the victim on blogs, Web sites, chat rooms, or e-commerce sites. Such acts are called ________. A) cybersquatting B) cyberstalking C) cyberbullying D) cyberwar E) cyberboating 30) Which of the following refers to the practice of deliberately causing emotional distress in the victim? A) cyberbullying B) cyberboating C) cyberstalking D) bot herdering E) cybersquatting