A ____ captures the user's passwords and credit card numbers (and sends them to someone else), or may even put the computer under someone else's remote control at some point in the future.
A. keystroke logger
B. virus
C. worm
D. sniffer
Answer: A
You might also like to view...
The Photoshop ____ consists of the Menu bar at the top of the screen, the Tools panel on the left of the screen, and the dock of panels on the right of the screen.
A. workspace B. menu C. screenshot D. design window
The second task described in a task dependency is called the ____________________ task.
Fill in the blank(s) with the appropriate word(s).
Match each of the following terms to its meaning:I.gray-hat hackerII.black-hat hackerIII.cyberloafingIV.social engineeringV.white-hat hackerA.techniques used to manipulate people into performing actions or divulging confidentialĀ informationB.an unethical hackerC.flaunts expertise to the administrator of a systemD.an ethical hackerE.using an employer's computer for non-work activities
Fill in the blank(s) with the appropriate word(s).
The ________ feature displays any values in the column that match what the user has typed so far
Fill in the blank(s) with correct word