What security term describes logging keystrokes to obtain passwords?
A) Phishing
B) Social engineering
C) Malware
D) Spyware
D
You might also like to view...
In a ____ font, each letter takes exactly the same width in the line.
A. serif B. sans-serif C. monospaced D. sans-mono
Tools that appear only when needed for specific tasks, are called ________ tools
A) specific B) optional C) conditional D) contextual
All of the following are guidelines about the appearance of letterhead elements EXCEPT ____.
A. use fonts that are easy to read B. make the font size of your name the same size as the rest of the text in the letterhead C. consider formatting your name in bold D. choose colors that convey your goals
If you use the Create new fill or adjustment layer button on the Layers panel, you will see three additional menu items: Solid Color, Gradient, and ____________________.
Fill in the blank(s) with the appropriate word(s).