The malware that secretly gathers your personal information is ________
A) a rootkit B) spyware C) shareware D) a worm
B
You might also like to view...
Describe the steps involved in performing a right rotation on a node in a binary search tree.
What will be an ideal response?
A process or task in Linux is represented by a __________ data structure.
Fill in the blank(s) with the appropriate word(s).
Consider the following statements:void pointerParameters(int* &p, double *q){...}In the function pointerParameters, the parameter q is a(n) ____________________ parameter.
Fill in the blank(s) with the appropriate word(s).
The purpose of debriefing after a security incident includes all of the following EXCEPT:
a. Discussion of changes in processes and procedures b. Discussion of changes in incident response c. Discussion of sanctions against contributing personnel d. Discussion of changes in technical controls