Intruders have been known to capture user passwords by using a ____ to replace the standard login program on the computer with an identical fake login that captures keystrokes.

A. worm
B. masquerade program
C. Trojan horse
D. virtual login console


Answer: C

Computer Science & Information Technology

You might also like to view...

Can a deadlock occur in the timestamp-ordered control described in the text?

What will be an ideal response?

Computer Science & Information Technology

Which statement below initializes array items to contain 3 rows and 2 columns?

a. int[][] items = {{2, 4}, {6, 8}, {10, 12}}; b. int[][] items = {{2, 6, 10}, {4, 8, 12}}; c. int[][] items = {2, 4}, {6, 8}, {10, 12}; d. int[][] items = {2, 6, 10}, {4, 8, 12};

Computer Science & Information Technology

Produce an object-oriented database design for the DreamHome case study documented in Appendix A. State any assumptions necessary to support your design.

What will be an ideal response?

Computer Science & Information Technology

A video file format is synonymous with the codec of the clip it contains.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology