_______ are invisible images or HTML code hidden within a web page or e-mail message and are used to transmit information without your knowledge.
A. Loggers
B. Cookies
C. History files
D. Web bugs
查看答案
_______ are programs that migrate through networks and operating systems and attach themselves to various other programs and databases.
A. Viruses
B. Zombies
C. Web bugs
DoS
A(n) _______ attempts to slow down or stop a computer system or network by sending repetitive requests for information.
A. zombie
B. DoS attack
C. worm
D. Trojan horse
A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet _______.
A. worm
B. cookie
C. scam
D. malware
_______ attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.
A first-party cookie
B. A Trojan horse
C. A third-party cookie
D. Phishing