____ record the keystrokes of a user into a text file that is sent back to the attacker for a specific period of time and frequency.

A. File sniffers
B. Text mirrors
C. Data recorders
D. Key loggers


Answer: D

Computer Science & Information Technology

You might also like to view...

Given the following pseudocode variable declaration, which of the statements shown would display the last character in the string?

``` Declare String lunch = "Spaghetti is stringy!" ``` a. Display lunch[0] b. Display lunch[18] c. Display lunch[length(lunch)] d. Display lunch[length(lunch) - 1]

Computer Science & Information Technology

The ________ data type would be used for long text or combinations of text and numbers

A) memo B) text C) number D) calculated

Computer Science & Information Technology

A swollen _____ on a smartphone is one that bulges and might even leak

Fill in the blank(s) with correct word

Computer Science & Information Technology

Larry has participated in a change proposal for his company. During the planning stage, Larry was told that his role in the change would be small but important. In the implementation stage, Larry completed his task according to the stipulations and timeframe of the plan. However, Larry was called in five times during the change to help others complete the change process. ? Where in the change management process did the problem occur?

A. Risk analysis B. Scope of plan C. Purpose of change D. Back-out plan

Computer Science & Information Technology