Which of the approaches is used to determine the password of a system account or a user account? (Choose two.)

A) Through the use of Trojan horse
B) Through the use of keylogger
C) Through the use of encryption mechanism
D) Through the use of compression mechanism
E) Through the use of file shares


A, B
Explanation:
• Trojan horse: A Trojan horse is a program that appears to be a useful application, but might capture a user's password and then make it available to the attacker.
• Keylogger: A program that runs in a computer's background and it logs keystrokes that a user makes. Therefore, after a user enters a password, the password is stored in the log created by the keylogger. An attacker can then retrieve the log of keystrokes to determine the user's password.
• Trojan horse: A Trojan horse is a program that appears to be a useful application, but might capture a user's password and then make it available to the attacker.
• Keylogger: A program that runs in a computer's background and it logs keystrokes that a user makes. Therefore, after a user enters a password, the password is stored in the log created by the keylogger. An attacker can then retrieve the log of keystrokes to determine the user's password.

Computer Science & Information Technology

You might also like to view...

The values contained in an object’s data members determine the object’s ____.

a. category b. class c. state d. scope

Computer Science & Information Technology

If a window does not contain any forms, ____.

A. the forms[] array is empty B. the forms[] array contains one element C. the forms[] array is undefined D. no JavaScript can be used on the page

Computer Science & Information Technology

What is the approximate size of the system boot volume created by the Windows installer for Windows Server 2016?

A. 50 MB B. 150 MB C. 350 MB D. 500 MB

Computer Science & Information Technology

What would you change in order to make characters narrower and give text a tall, thin appearance?

A. Scale B. Font size C. Font style D. Font effects

Computer Science & Information Technology