题目内容

Which type of program would likely be used by investigators to record a potential suspects' Internet activities?

A. Cookie
B. Global positioning system
C. Keystroke logger
D. Web bug

查看答案
更多问题

This type of computer criminal creates and distributes malicious programs.

A. Employee
B. Hacker
Cracker
D. Keystroke logger

Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.

A. Illusion of anonymity
Browser cache
C. History files
D. Privacy mode

Which of the following is not malware?

A. Trojan horses
B. Viruses
C. Worms
D. Ad-Aware

A program that replicates itself and clogs computers and networks.

A. Virus
B. Worm
C. Denial-of-service attack
D. Trojan horse

答案查题题库