Lsssss Lsssss
  • 01-12-2020
  • Computers and Technology
contestada

On tool hackers use to get sensitive information from victims is/are:
A. Loggerware
B. Keyloggers
C. Robots
D. Phishing

Respuesta :

shinyglitterr
shinyglitterr shinyglitterr
  • 01-12-2020
Pretty sure it’s keyloggers because it’s the only one that makes sense to me but I’m not 100% sure on that one
Answer Link
antalsebo
antalsebo antalsebo
  • 01-12-2020
Absolutely c is the correct!
Answer Link

Otras preguntas

How long can each player hold the ball during game play before a penalty is called?.
please help asap. which of the following is an example of the endocrine system maintaining homeostasis? A: detecting a pain stimulus and sending a signal to the
What is the term for the power of a nation-state to determine its form of government and its economic and social systems?
A right triangle is shown. The hypotenuse has a length of 445 feet and another side has length 80 feet. A car is traveling up a steep ramp to a parking garage.
» The table shows the coordinates of the vertices of DEF and its image. DEF D'E'F' D(0, 15) D'(-15, 15) E(10,20) E'(-5,20) F(15,5) F'(0,5) 1) Which translation
What were marriage ceremonies like in elizabethan times.
Linda Sue Park's “A Long Walk to Water” is a story about the lengths to which people will go in order to survive. Based on our readings so far, we can see that
What is the irony in this political cartoon?
Which would help you the least when creating your own practice test?
please answer quickly!! read the picture. thank you!!​