Intruders have been known to capture user passwords by using a ____ to replace the standard login program on the computer with an identical fake login that captures keystrokes.
A. worm
B. masquerade program
C. Trojan horse
D. virtual login console
Answer: C
Computer Science & Information Technology
You might also like to view...
The System Restore utility can be started from command line using what executable?
A. msconfig.exe B. sfc.exe C. services.msc D. rstrui.exe
Computer Science & Information Technology
Desktop, laptop, and tablet computers, and mobile devices are classified as ________.
A. midrange computers B. supercomputers C. personal computers D. mainframe computers
Computer Science & Information Technology