________ can record your passwords to websites

A) Spy Sweepers B) Spyware C) Keystrokers D) Adware


B

Computer Science & Information Technology

You might also like to view...

When creating a new keyboard macro, in the Customize Keyboard dialog box, enter the new keyboard command in the ________ box

A) Keyboard shortcut B) Press new shortcut key C) Current keys D) Press new assigned key

Computer Science & Information Technology

A credit card reader can be

A) Used mostly by criminals to steal IDs B) A must-have for the small business owner C) Wired or wireless and could attach to a tablet or other mobile device D) Wireless and must have a password built into it

Computer Science & Information Technology

Which of the following is a reason why Pete, a security administrator, would implement port security?

A. To inspect the TPC and UDP ports of incoming traffic B. To port C++code into Java bit-code in a secure manner C. To implement secure datacenter electronic access D. To limit the number of endpoints connected through the same switch port

Computer Science & Information Technology

Which is the maximum number of partition that most disks can be divided up?

A. 2 B.3 C.4 D.5

Computer Science & Information Technology