Which of the following attacks installs a key logger on the victim's system in an attempt to collect usernames and passwords?
A. IP spoofing attack
B. Denial-of-service attack
C. Rogue code attack
D. Emanation eavesdropping attack
Answer: C
Explanation: In a rouge code attack, the victim without his knowledge installs a key logger that collects sensitive information, such as username and passwords.
You might also like to view...
It is important to include Web 2.0 technologies that focus on enabling and facilitating user-generated content and collaboration. These include:
What will be an ideal response?
_____ accounts can view reports of children's online activity, limit how long and when they use their devices.?
A. ?Family B. ?Administrator C. ?Adult D. ?Individual
Short Answer
What will be an ideal response?
The _______________ style is a classic news writing style that places a summary first, followed by details, and then any background information
Fill in the blank(s) with the appropriate word(s).