1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liubo4ka [24]
4 years ago
5

The tools that cyber criminals often use, including computer viruses, worms, trojan horses and spyware, are called __________. q

uestion 12 options:
Computers and Technology
1 answer:
ivanzaharov [21]4 years ago
3 0
The options were: 

-malware
-spam
-Denial of Service
-Hacking 



The correct answer would be Malware. Here is why: Malware refers to a program or script that will affect a target device in a negative way, it cant be hacking because it is a topic, not a tool. Denial of Service is a type of attack that temporarily shuts down servers after a number of requests a device(s) make exceeds the number of requests it can take in a certain amount of time. Spam is either an advertising email from a third party company that bought your email from a list server from a service you gave your info to, like Facebook. Or spam could be a social engineering attack sent by someone trying to harvest your credentials from an email source your email server found untrustworthy.  

Please message me if you need any more help with this stuff, I am doing a lot of hacking projects right now and I think I would be a great contact!

Hope this helped!

You might be interested in
What is it called when you want to automatically create columns that are the same length in a newsletter?
babunello [35]
Its called column creation
7 0
3 years ago
How long is the bachelor's program at Eth Zurich? 3 or 4 years?
natulia [17]
The bachelor's program at Eth Zurich is 3 years.
I hope this helps!
:-)
4 0
3 years ago
What is a rigid layer that surrounds plant cell.
Helen [10]
The plants cell wall.
5 0
3 years ago
Given a 13 bit address bus, how many unique addressed could be accessed? g
valina [46]
2^13 = 8192 addresses
8 0
4 years ago
Please someone help!!!!
Montano1993 [528]

Answer:

do what the directions say and you should be able to figure out the answer if not contact me through brainly

Explanation:

3 0
3 years ago
Other questions:
  • List and describe the three types of cloud models described by Microsoft.
    9·1 answer
  • In JAVA, answer the following:
    15·1 answer
  • How do you fix this windows 7 screen​
    8·1 answer
  • A business wants to centralize its administrative tasks. At the same time, it wants the existing systems to manage and sustain t
    14·2 answers
  • Which of the following circuits has an equivalent resistance of 30 Ω?
    8·2 answers
  • I have a question. This question will probably be deleted, but why do moderators keep deleting my answers when they are legitima
    13·1 answer
  • Alice just wrote a new app using Python. She tested her code and noticed some of her lines of code are out of order. Which princ
    7·1 answer
  • The fractional_part function divides the numerator by the denominator, and returns just the fractional part.
    10·1 answer
  • When testing a game, why might you consider throttling the game’s “frames per second”?
    9·1 answer
  • What concerns exist wherever personally identifiable information is collected stored in digital form or otherwise
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!