What security term describes logging keystrokes to obtain passwords?

A) Phishing
B) Social engineering
C) Malware
D) Spyware


D

Computer Science & Information Technology

You might also like to view...

In a ____ font, each letter takes exactly the same width in the line.

A. serif B. sans-serif C. monospaced D. sans-mono

Computer Science & Information Technology

Tools that appear only when needed for specific tasks, are called ________ tools

A) specific B) optional C) conditional D) contextual

Computer Science & Information Technology

All of the following are guidelines about the appearance of letterhead elements EXCEPT ____.

A. use fonts that are easy to read B. make the font size of your name the same size as the rest of the text in the letterhead C. consider formatting your name in bold D. choose colors that convey your goals

Computer Science & Information Technology

If you use the Create new fill or adjustment layer button on the Layers panel, you will see three additional menu items: Solid Color, Gradient, and ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology