The malware that secretly gathers your personal information is ________

A) a rootkit B) spyware C) shareware D) a worm


B

Computer Science & Information Technology

You might also like to view...

Describe the steps involved in performing a right rotation on a node in a binary search tree.

What will be an ideal response?

Computer Science & Information Technology

A process or task in Linux is represented by a __________ data structure.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Consider the following statements:void pointerParameters(int* &p, double *q){...}In the function pointerParameters, the parameter q is a(n) ____________________ parameter.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The purpose of debriefing after a security incident includes all of the following EXCEPT:

a. Discussion of changes in processes and procedures b. Discussion of changes in incident response c. Discussion of sanctions against contributing personnel d. Discussion of changes in technical controls

Computer Science & Information Technology