If an attacker wishes to collect confidential financial data, passwords, PINs and any personal data stored on your computer which of the following programs would they choose to use?

A. Adware
B. Spybot
C. Malware
D. Spyware

Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following cannot be done with mail merge?

A) Creating records B) Filtering records C) Selecting a subset of fields to use D) Sorting records

Computer Science & Information Technology

In the case in which a hacker named Maxim broke into CD Universe credit card files, the FBI and company employees accessed original files to determine how the intrusion had occurred. What was the impact on the case of working with original files?

A) The case was nullified, because the last-access dates on the original files were changed. B) There was no impact on the case, because a correct chain of custody form was produced. C) The case was nullified, because the FBI did not have permission to open the original files. D) There was no impact on the case, because the original files were copied correctly.

Computer Science & Information Technology