What type of hardware devices and computer programs can be used to obtain passwords by capturing key strokes on a targeted computer system?

A. Viruses
B. Keyloggers
C. Macro viruses
D. Shells


Answer: B

Computer Science & Information Technology

You might also like to view...

An interface should:

a. be “transparent” to the user. b. provide control to the people who use it. c. allow the user to move about within the project. d. provide access to the “media” in the project. e. all of the above.

Computer Science & Information Technology

When searching for unrecorded liabilities at the end of an accounting period, the accountant would search all of the files except

A. the purchase requisition file B. the cash receipts file C. the purchase order file D. the receiving report file

Computer Science & Information Technology

The objective of software project planning is to

A. convince the customer that a project is feasible.  B. enable a manager to make reasonable estimates of cost and schedule. C. determine the probable profit margin prior to bidding on a project. D. make use of historical project data.

Computer Science & Information Technology

What are the Security considerations to be included when implementing a system?

What will be an ideal response?

Computer Science & Information Technology