When information gatherers employ techniques that cross a legal or ethical threshold they are conducting ______?

59.When information gatherers employ techniques that cross a legal or ethical threshold, they areconducting __________.(A) industrial espionage(B) competitive intelligence(C) opposition research(D) hostile investigationAnswer :(A)

Front Back

A(n) ______ is an object, person, or other entity that represents an ongoing danger to an asset.

Duplication of software-based intellectual property is more commonly known as software ______.

A computer virus consists of segments of code that perform ______ actions.

A(n) ________ is a malicious program that replicates itself constantly, without requiring another program environment.

A virus or worm can have a payload that installs a(n) ___ door or trap door component in a system, which allows the attacker to access the system at will with special privileges.

A momentary low voltage is called a(n) ____.

Some information gathering techniques are quite legal, for example, using a Web browser to perform market research. These legal techniques are called, collectively, competitive _________.

When information gatherers employ techniques that cross the threshold of what is legal or ethical, they are conducting industrial _______.

The expert hacker sometimes is called _____ hacker.

Script ______ are hackers of limited skill who use expertly written software to attack a system.

A(n) _______ hacks the public telephone network to make free calls or disrupt services.

ESD means electrostatic _____.

A(n) _____ is an act that takes advantage of a vulnerability to compromise a controlled system.

A(n) _______ is an identified weakness in a controlled system, where controls are not present or are no longer effective.Feedback

Attempting to reverse-calculate a password is called _______.