Which of the following is the process of keeping track of a user’s activity while accessing network resources?
Which of the following types of viruses protects itself from antivirus programs and is more difficult to trace?