Helen downloaded a greeting card program from the internet.She was surprised that it really didn't do what it was supposed to do.What the program did was send nasty,profane e-mails to all the people in her contact list.Helen is the victim of ________.
A) spoofing
B) keyloggers
C) a Trojan horse
D) worms
Correct Answer:
Verified
Q9: High-availability computing is also referred to as
Q46: Fault-tolerant computers contain redundant hardware,software,and power supply
Q47: The Cornflicker worm was first identified in
Q48: Businesses must protect only their own information
Q49: Betty downloaded a peer to peer file
Q51: _ is/are methods,policies,and organizational procedures ensuring the
Q53: The Conficker worm uses flaws in Windows
Q55: The Sasser.ftp worm Word macro script mailed
Q84: NAT conceals the IP addresses of the
Q96: Public key encryption uses two keys.
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents