题目内容

_______ is the illegal assumption of someone's identity for the purposes of economic gain.

A. Denial of service attack
B. Keystroke logging
Cyberbullying
D. Identity theft

查看答案
更多问题

_______ store information about the current session, your general preferences, and your activity on the website.

A. First-party cookies
B. Web bugs
C. Third-party cookies
D. Keystroke loggers

_______ are used by advertising companies to keep track of your web activity as you move from one site to the next.

A. Sniffers
B. Third-party cookies
C. Keystroke loggers
D. First-party cookies

A(n) _______ is someone who gains unauthorized access to computer systems.

A. cracker
B. cookie
C. hacker
D. logger

_______ are invisible images or HTML code hidden within a web page or e-mail message and are used to transmit information without your knowledge.

A. Loggers
B. Cookies
C. History files
D. Web bugs

答案查题题库