Which of the following seeks to get information from your computer and make it available to some other person?
A) Spyware
B) Viruses
C) Adware
D) Trojan horses
A) Spyware
Computer Science & Information Technology
You might also like to view...
On a switch, static MAC addresses are best characterized by which of the following?
a. They are dynamic and change as the device changes interface ports. b. They are assigned to a specific interface and do not change. c. They are not stationary for a switch port. d. All of these answers are correct.
Computer Science & Information Technology
Assume x = 4, which of the following is true?
a. !(x == 4) b. x != 4 c. x == 5 d. x != 5
Computer Science & Information Technology
How are forms often saved so they can be used repeatedly for data entry?
A) Styles B) Master Documents C) Reports D) Templates
Computer Science & Information Technology
Which of the following certifications is not administered by (ISC)2?
A. CISSP B. CEH C. SSCP D. CSSLP
Computer Science & Information Technology