41. Which of the following is an example of proprietary system software?
44. With respect to computers, which one of the following best describes phishing?
A malicious program installed on a system that stays concealed to avoid detection.
A method of bypassing normal authentication procedures over a connection to a network.
A type of unsolicited bulk email of identical messages sent to numerous recipients.
An attempt to acquire sensitive information for malicious reasons, by masquerading as a trustworthy entity.