Tugas Review – Current Popular IT IV – T0693 Module 12 11. Which two of the following are types of Dos attacks? a. smurf b. teardrop c. wave d. river 12. What term describes an immature individual that use scripts, software programs, or techniques created by other, more skilled crackers? a. Baby hacker b. Script kiddies c. Cracker kids d. Child hacker 13. What program presents itself as another program to obtain information? a. DoS b. Masked hacker c. Saint d. Trojan horse 14. What is the most sophisticated type of internal security threat? Where theft of trade secrets is big business, and companies can become overnight successes or failures because of it? a. Trojan horse b. User ignorance c. Corporate espionage d. Spy programs 15. Which is NOT a third-party encryption programs are available on the market? a. PC Guardian b. PC Protect c. Deltacrypt d. Winzap