A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet _______.
A. worm
B. cookie
C. scam
D. malware
查看答案
_______ attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.
A first-party cookie
B. A Trojan horse
C. A third-party cookie
D. Phishing
Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called _______.
A. zombies
B. DoS sites
C. phishes
D. Web bugs
_______ is the use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.
A. Zombie apocalypse
B. Cyberbullying
C. Trojan horse attack
D. Identity theft
A(n) _______ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information.
A. viral
B. phishing
C. rogue
D. worm