Internet Threats Quiz
Have a go at these questions:
1 |
Internet Threats 1AWhat type of file does key logger software typically use to store its recordings? |
2 |
Internet Threats 1BWhat hardware does a rogue dialler make use of for this type of Internet scam to work? |
Next: Spam