IT Essentials 8 & ITE 7.02 | |
IT Essentials 8 & ITE 7.02 - Final - Mid-term - Cert | |
Chapter 1 -9 Skills Assessment | NA |
Chapter 10 - 14 Skills Assessment | NA |
Practice Final Exam Answers Ch 1 - 9 | Online Test |
Practice Final Exam Answers Ch 10 - 14 | Online Test |
Final Exam Answers Ch 1 - 9 | Online Test |
Final Exam Answers Ch 10 - 14 | Online Test |
Final Exam Composite Answers Ch 1 - 14 | Online Test |
A+ 220-1001 | Online Test |
A+ 220-1002 | Online Test |
Which type of security threat can be transferred through email and is used to gain sensitive information by recording the keystrokes of the email recipient?
- adware
- Trojan
- worm
- virus
- grayware
Explanation: Adware does not record keystrokes. A worm self-replicates across the network. A Trojan appears to be a legitimate program while carrying malware, and grayware is a general term for software that may be malware.
IT Essentials 8 & ITE 7.02 | |
IT Essentials 8 & ITE 7.02 - Final - Mid-term - Cert | |
Chapter 1 -9 Skills Assessment | NA |
Chapter 10 - 14 Skills Assessment | NA |
Practice Final Exam Answers Ch 1 - 9 | Online Test |
Practice Final Exam Answers Ch 10 - 14 | Online Test |
Final Exam Answers Ch 1 - 9 | Online Test |
Final Exam Answers Ch 10 - 14 | Online Test |
Final Exam Composite Answers Ch 1 - 14 | Online Test |
A+ 220-1001 | Online Test |
A+ 220-1002 | Online Test |