Lsssss Lsssss
  • 01-12-2020
  • Computers and Technology
contestada

On tool hackers use to get sensitive information from victims is/are:
A. Loggerware
B. Keyloggers
C. Robots
D. Phishing

Respuesta :

shinyglitterr
shinyglitterr shinyglitterr
  • 01-12-2020
Pretty sure it’s keyloggers because it’s the only one that makes sense to me but I’m not 100% sure on that one
Answer Link
antalsebo
antalsebo antalsebo
  • 01-12-2020
Absolutely c is the correct!
Answer Link

Otras preguntas

Which of the following quotes is the best excerpt to support a theme of having ambition and productivity versus idleness and pleasure? "’What in the world are t
Help asap plz ill give a gold medal. the label on cars antifreeze claims to protect the car between -30celsius and 130celsius. to convert Celsius temperature Fa
What is the remainder of (x3 - 6x2 - 9x + 3) ÷ (x - 3) A. -25 B. -52 C. -51 D. -17
How long is arc ACB in the figure if the radius of the circle is 6? Round your answer to two decimal places.
A firework being ignited is an example of a(n) chemical reaction.
There are exactly four positive integers $n$ such that \[\frac{(n + 1)^2}{n + 23}\] is an integer. Compute the largest such $n$.
plzzz help What is the distance between P(-3, -2) and Q(5, -2)?
Which transition word is not correctly used in the passage? Advertising is a creative art that serves several purposes. The main purpose of advertisements is to
Correctly punctuate the following text. Add three colons and two semicolons. Thought for the day there's one thing that grinds my gears more than anything else
2. It is safe to give and receive blood in the United States. True False