What security term describes logging keystrokes to obtain passwords?

A) Phishing
B) Social engineering
C) Malware
D) Spyware

D

Computer Science & Information Technology

You might also like to view...

When a formula is in an active cell, the underlying formula is visible in the ________

A) status bar B) worksheet C) formula bar D) Name Box

Computer Science & Information Technology

The ____ value is a number from 0 to 1 that measures the strength of a trend.

A. A-squared B. P-squared C. R-squared D. T-squared

Computer Science & Information Technology