A bot can use a __________ to capture keystrokes on the infected machine to retrieve sensitive information.

Fill in the blank(s) with the appropriate word(s).

keylogger

Computer Science & Information Technology

You might also like to view...

What is the name of the IPv6 address that is the same as the IPv4 public addresses?

A. global address B. link-local address C. private D. broadcast

Computer Science & Information Technology

An alternative to each server being required to confirm identities of clients who request service is to use an _______ that knows the passwords of all users and stores them in a centralized database.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology