An attacker can install a __________ to capture keystrokes on the infected machine to retrieve sensitive information.

Fill in the blank(s) with the appropriate word(s).

keylogger

Computer Science & Information Technology

You might also like to view...

Which of the following is the keyboard shortcut for Print Preview?

a. F2 b. Ctrl + F2 c. Ctrl + F4 d. F4

Computer Science & Information Technology

Which of the following best describes a black hat hacker?

a. A person that usually follows the law but in some cases performs illegal activities b. Someone who is hacking into computer systems with the permission of the owner of the systems c. Someone who hacks into systems to cause harm and/or for monetary gain d. Someone who is hired by a company to hack into systems

Computer Science & Information Technology