All of the following are unwanted software a hacker could install on your computer, EXCEPT ________

A) keystroke loggers
B) ghosts
C) Trojan horses
D) rootkits

B

Computer Science & Information Technology

You might also like to view...

The best way to prevent password theft is to change your Office 365 password often, especially after using public networks

Indicate whether the statement is true or false

Computer Science & Information Technology

What is the difference between an Access application and a database?

What will be an ideal response?

Computer Science & Information Technology