Which of the following malware types typically allows an attacker to monitor a user’s computer, is
characterized by a drive-by download, and requires no user interaction?
A.
Virus
B.
Logic bomb
C.
Spyware
D.
Adware
Which of the following malware types typically allows an attacker to monitor a user’s computer, is
characterized by a drive-by download, and requires no user interaction?
Which of the following malware types typically allows an attacker to monitor a user’s computer, is
characterized by a drive-by download, and requires no user interaction?
A.
Virus
B.
Logic bomb
C.
Spyware
D.
Adware