题目内容

_______ are invisible images or HTML code hidden within a web page or e-mail message and are used to transmit information without your knowledge.

A. Loggers
B. Cookies
C. History files
D. Web bugs

查看答案
更多问题

_______ are programs that migrate through networks and operating systems and attach themselves to various other programs and databases.

A. Viruses
B. Zombies
C. Web bugs
DoS

A(n) _______ attempts to slow down or stop a computer system or network by sending repetitive requests for information.

A. zombie
B. DoS attack
C. worm
D. Trojan horse

A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet _______.

A. worm
B. cookie
C. scam
D. malware

_______ attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.

A first-party cookie
B. A Trojan horse
C. A third-party cookie
D. Phishing

答案查题题库