Which type of program would likely be used by investigators to record a potential suspects' Internet activities?
A. Cookie
B. Global positioning system
C. Keystroke logger
D. Web bug
查看答案
This type of computer criminal creates and distributes malicious programs.
A. Employee
B. Hacker
Cracker
D. Keystroke logger
Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.
A. Illusion of anonymity
Browser cache
C. History files
D. Privacy mode
Which of the following is not malware?
A. Trojan horses
B. Viruses
C. Worms
D. Ad-Aware
A program that replicates itself and clogs computers and networks.
A. Virus
B. Worm
C. Denial-of-service attack
D. Trojan horse