Which of the following attacks installs a key logger on the victim's system in an attempt to collect usernames and passwords?

A. IP spoofing attack
B. Denial-of-service attack
C. Rogue code attack
D. Emanation eavesdropping attack


Answer: C
Explanation: In a rouge code attack, the victim without his knowledge installs a key logger that collects sensitive information, such as username and passwords.

Computer Science & Information Technology

You might also like to view...

It is important to include Web 2.0 technologies that focus on enabling and facilitating user-generated content and collaboration. These include:

What will be an ideal response?

Computer Science & Information Technology

_____ accounts can view reports of children's online activity, limit how long and when they use their devices.?

A. ?Family B. ?Administrator C. ?Adult D. ?Individual

Computer Science & Information Technology

Short Answer

What will be an ideal response?

Computer Science & Information Technology

The _______________ style is a classic news writing style that places a summary first, followed by details, and then any background information

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology