_______ are used by advertising companies to keep track of your web activity as you move from one site to the next.
A. Sniffers
B. Third-party cookies
C. Keystroke loggers
D. First-party cookies
查看答案
A(n) _______ is someone who gains unauthorized access to computer systems.
A. cracker
B. cookie
C. hacker
D. logger
_______ are invisible images or HTML code hidden within a web page or e-mail message and are used to transmit information without your knowledge.
A. Loggers
B. Cookies
C. History files
D. Web bugs
_______ are programs that migrate through networks and operating systems and attach themselves to various other programs and databases.
A. Viruses
B. Zombies
C. Web bugs
DoS
A(n) _______ attempts to slow down or stop a computer system or network by sending repetitive requests for information.
A. zombie
B. DoS attack
C. worm
D. Trojan horse