Which of the following will allow Pete, a security analyst, to trigger a security alert because of a tracking cookie?
Network based firewall
Host based firewall
Spyware monitors a user’s activity and uses network protocols to reports it to a third party without the user’s
knowledge. This is usually accomplished using a tracking cookie.