QN01. Which of the following records logons and deletions?a. Key loggerb. Packet snifferc. Log analysis toolsd. Screen capturesAnswer: C QN02. E-mail messages may be stored on which of the following computers?a. Sender’s computerb. Sender’s serverc. Recipient’s serverd. All of the aboveAnswer: D QN03. What might identity thieves do with your identity?a. Apply for and use credit cardsb. Apply for a loanc. Change their identityd. All of the aboveAnswer: D QN04. Which of the following is not a common approach to phishing?a. Send an official-looking e-mail asking for confidential informationb. Ask people to fill out and return a fake letter using postal mailc. Ask people to click a link in an e-mail to open a submission form on a web paged. All of the above are uncommon approaches to phishingAnswer: B QN05. A technique used to gain personal information for the purpose of identity theft, often by e-mail, is called?a. Phishingb. Cardingc. Brand spoofingd. All of the aboveAnswer: D QN06. Companies can gather information about employees and potential employees from which of the following places?a. Job applicationsb. Credit reportsc. Companies that track Web surfersd. All of the aboveAnswer: D QN07. Cyber slacking consists of what activities?a. Visiting “inappropriate” web sitesb. Visiting news sitesc. Chatting online with others about non-work topicsd. All of the aboveAnswer: D QN08. Cookies are used to do which of the following?a. Store your ID and password for subsequent logons to the siteb. Store contents of electronic shopping cartsc. To track web activityd. All of the above and moreAnswer: D QN09. Unsolicited e-mail is called what?a. Junk mailb. Spamc. Extra maild. None of the aboveAnswer: B QN10….