题目内容

Using publically available databases, information resellers create _______ and sell them to direct marketers, fundraisers, and others.

A. digital footprints
B. proxy people
C. electronic profiles
D. virtual avatars

查看答案
更多问题

_______ is the illegal assumption of someone's identity for the purposes of economic gain.

A. Denial of service attack
B. Keystroke logging
Cyberbullying
D. Identity theft

_______ store information about the current session, your general preferences, and your activity on the website.

A. First-party cookies
B. Web bugs
C. Third-party cookies
D. Keystroke loggers

_______ are used by advertising companies to keep track of your web activity as you move from one site to the next.

A. Sniffers
B. Third-party cookies
C. Keystroke loggers
D. First-party cookies

A(n) _______ is someone who gains unauthorized access to computer systems.

A. cracker
B. cookie
C. hacker
D. logger

答案查题题库