Which of the following malware types typically allows an attacker to monitor a user’s computer, is
characterized by a drive-by download, and requires no user interaction?

A.
Virus
B.
Logic bomb
C.
Spyware
D.
Adware
Explanation:
Spyware is software that is used to gather information about a person or organization without their
knowledge and sends that information to another entity.