Which of the following malware types typically allows an attacker to monitor a user’s computer, is
characterized by a drive-by download, and requires no user interaction?
 
A.
 Virus
B.
 Logic bomb
C.
 Spyware
D.
 Adware
Explanation:
Spyware is software that is used to gather information about a person or organization without their
knowledge and sends that information to another entity.
 
                