What are Specter Pro, FakeGINA, and Eblaster examples of?
a. Wrapper tools
b. Keyloggers
c. Backdoors
d. Port redirection tools
ANS: B
Computer Science & Information Technology
You might also like to view...
An action set is an organizational ____ that can be opened or expanded.
a. folder b. menu list c. panel d. channel
Computer Science & Information Technology
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.
A. brute-force attack B. spammer C. worm D. Trojan horse
Computer Science & Information Technology