A _________ captures keystrokes on the infected machine.
A) keylogger
B) rootkit
C) scanner
D) sniffer
Correct Answer:
Verified
Q31: Three key objectives of computer security are:
Q32: Use Trojan horses to leave backdoors for
Q33: Exposure, interception, inference and intrusion can result
Q34: A _ attack attempts to learn or
Q34: An example of _ is known as
Q37: A _ is a program that can
Q38: The three key concepts that are at
Q39: _ assures that individuals control or influence
Q40: _ is a circumstance or event that
Q41: A _ is code embedded in some
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents