complete verified solutions
2025-2026
Unauthorized access - answer Gaining access to a computer, network, file,
or other resource without permission
Unauthorized use - answer Using a computer resource for unapproved
activities
Hacking - answer Using a computer to break into another computer
system
War driving - answer Driving around an area to find a Wi-Fi network to
access and use without authorization
Wi-Fi piggybacking - answer Accessing an unsecured Wi-Fi network from
your current location without authorization
Interception of communications - answer Messages, files, logon
information etc. can be intercepted in not secured
Access control systems - answer Used to control access to: Facilities,
Computer networks, Databases, Web site accounts
Possessed knowledge access systems - answer Use information that only
an individual should know; Usernames; Passwords
Cognitive authentication systems - answer Use information the individual
knows (birthplace, pet names, etc.)