Sociology Questions
Explore questions in the Sociology category that you can ask Spark.E!
a software program that performs on of two functions: brute-force password attack to gain unauthorized access to a system or recovery of passwords stored in a computer system
a computer expert who explores computing environment to gain knowledge
an attack in which one user or computer pretends to be another user or computer
a type of attack in which the attacker takes control of a session between two machines and masquerades as one of them
an application incorporation known software vulnerabilities, data, and scripted commands to "exploit" a weakness in a computer system or IP host device
What refers to a situation in which people are unsure of how to behave because of absent, conflicting, or confusing social norms?
According to _____________, being a deviant or a criminal depends on how others react and define deviance.
a computer attacker with average abilities who may one day become a black-hat hacker. also called wannabes
an attack in which the attacker gets between two parties and intercepts messages before transferring them on to their intended destination
a program or dedicated hardware devise that inspects network traffic passing through it and denies or permits that traffic based on a set of rules you determine at configuration
Abigail wants to be a nurse after she graduates from college. She has joined the Global Medical Brigades on campus and works as a clinical associate at the local hospital. For Abigail, nurses are what?
an information security or network professional who uses various penetration test tools to uncover or fix vulnerabilities
software designed to infiltrate one or more target computers and follow an attacker's instructions
short for malicious software. software designed to infiltrate one or more target computers and follow an attacker's instructions
the testing that a hacker performs to break into a computer system or IP host device; intrusive testing generates malicious network traffic
the unique knowledge a business possesses that gives it a conpetitive advantage over similar companies in similar industries
an attempt to exploit a vulnerability of a computer or network component
surveillance software or hardware that records to a log file every keystroke a user logs; also known as keylogger
____ deviance is behavior that violates laws; ____ deviance is behavior that breaks customary practices.
True or False: Groupthink occurs most commonly in unstructured groups.
