Lsssss Lsssss
  • 01-12-2020
  • Computers and Technology
contestada

On tool hackers use to get sensitive information from victims is/are:
A. Loggerware
B. Keyloggers
C. Robots
D. Phishing

Respuesta :

shinyglitterr
shinyglitterr shinyglitterr
  • 01-12-2020
Pretty sure it’s keyloggers because it’s the only one that makes sense to me but I’m not 100% sure on that one
Answer Link
antalsebo
antalsebo antalsebo
  • 01-12-2020
Absolutely c is the correct!
Answer Link

Otras preguntas

The ottoman central government appointed officials as?
Which of the following four items is least like the other three? apple, asparagus, peach, pear
use prime factorization to find the gcf of 24,48
A grant writer is one who applies for available funds. true or false
How are suites or sets of applications (such as Microsoft Office) beneficial to users?
What is "a number on its own, it has a fixed value?"
Trying to solve equation 9x=3x+11.
Simplify. 1/4(1−2/3)2 last 2 is a exponent 1/3
Jenny's frog made one jump of 2.34 m. Christina's frog made jumps of 1.22 m and 0.89 m. How much further did Jenny's frog jump in one jump than Christina's frog
is perpendicular to and passes through point C(5, 12). If the coordinates of A and B are (-10, -3) and (7, 14), respectively, the x- intercept of is ____. The