What security term describes logging keystrokes to obtain passwords?
A) Phishing
B) Social engineering
C) Malware
D) Spyware
D
Computer Science & Information Technology
You might also like to view...
When a formula is in an active cell, the underlying formula is visible in the ________
A) status bar B) worksheet C) formula bar D) Name Box
Computer Science & Information Technology
The ____ value is a number from 0 to 1 that measures the strength of a trend.
A. A-squared B. P-squared C. R-squared D. T-squared
Computer Science & Information Technology