Multiple Choice
Betty downloaded a peer to peer file sharing program.She is worried that it might have come with spyware attached to it.She had a friend who had a spyware problem where all of her keystrokes were stolen which included her bank passwords.Betty's friend was a victim of ________.
A) spoofing
B) keyloggers
C) a Trojan horse
D) worms
Correct Answer:

Verified
Correct Answer:
Verified
Q12: The range of Wi-Fi networks can be
Q18: _ use scanning software to look for
Q22: How can a firm's security policies contribute
Q43: _ refers to policies, procedures, and technical
Q89: Most antivirus software is effective against<br>A) only
Q90: Statements ranking information risks and identifying security
Q158: _ is tricking people into revealing their
Q161: A _ is a device about the
Q164: Evil twins are<br>A)Trojan horses that appears to
Q166: _ planning focuses on how the company