| List - I | List -II |
| (A) Phishing | (I) Code redirects user to fake website without user knowing |
| (B) Spyware | (II) Alters or deletes data |
| (C) Pharming | (III) Fake email replicates well known organization |
| (D) Viruses | (IV) Monitors information by monitoring key presses on a user's keyboard |
What comes next in the series?
\(2, 6, 12, 20, 30, \ ?\)