________ can record your passwords to websites

A) Spy Sweepers B) Spyware C) Keystrokers D) Adware

B

Computer Science & Information Technology

You might also like to view...

Which of the following tasks are completed during the Acquire or Develop step in the Security System Development Life Cycle?

A. Assess the system's risk. B. Determine the security category of the system. C. Integrate security into the system. D. Review operational readiness.

Computer Science & Information Technology

Which Windows Server 2008 R2 version has a smaller footprint, reduces the number of security vulnerabilities, and does not include the Windows Explorer Shell?

A. Standard Edition B. Server Core C. Datacenter Edition D. Enterprise Edition

Computer Science & Information Technology