A good ____ can be used to scan the Web to assemble data for search engines.
A. zombie
B. spyware program
C. bot
D. RAT
Answer: C
You might also like to view...
You can display the Paste Special dialog box by double-clicking the selected text and from the displayed list clicking Paste Special
Indicate whether the statement is true or false
A(n) ________ is a style that can be applied as a character style in one place and as a paragraph style in another
Fill in the blank(s) with correct word
Which security rule should be implemented to minimize risk of malware infection of endpoint systems?
A. Configure a software firewall. B. Disable the use of USB storage devices. C. Encrypt all file storage. D. Audit user activity.
The Time to Live field indicates how long a particular datagram is allowed to live.
Answer the following statement true (T) or false (F)