Lsssss Lsssss
  • 01-12-2020
  • Computers and Technology
contestada

On tool hackers use to get sensitive information from victims is/are:
A. Loggerware
B. Keyloggers
C. Robots
D. Phishing

Respuesta :

shinyglitterr
shinyglitterr shinyglitterr
  • 01-12-2020
Pretty sure it’s keyloggers because it’s the only one that makes sense to me but I’m not 100% sure on that one
Answer Link
antalsebo
antalsebo antalsebo
  • 01-12-2020
Absolutely c is the correct!
Answer Link

Otras preguntas

Which one of the following pairs of units may not be added together, even after the appropriate unit conversions have been made? a. grams and milligrams b. mile
A 3050 foot long road travels directly up a 550 foot tall hill. Select the equation that can be used to solve for the angle of elevation (0) from the bottom of
The wheel was first documented as being used in Mesopotamia (Iraq today) in 3500 B.C. The first steam powered vehicle that used wheels was invented in 1672 A.D.
Triangle P Q R is shown. Angle Q P R is a right angle. The length of hypotenuse Q R is 14.1 and the length of P R is 12.7. What is the measure of ∠R in △PQR? Ro
Of Mice and men Chapter 6 Page 99-107
can someone help me with this question
Ignacio's grandmother is becoming old and frail. Which describes a technology that can help her stay in her home instead of moving to a nursing home?
The basic question between Lincoln and Congress at the end of the Civil War was... 4 points
analyse the workshopping process used by the Mbongeni Ngema and Percy Mtwa to create the original play woza Albert​
A side of the triangle below has been extended to form an exterior angle of 129°. Find the value of x.