A bot can use a __________ to capture keystrokes on the infected machine to retrieve sensitive information.
Fill in the blank(s) with the appropriate word(s).
keylogger
Computer Science & Information Technology
You might also like to view...
What is the name of the IPv6 address that is the same as the IPv4 public addresses?
A. global address B. link-local address C. private D. broadcast
Computer Science & Information Technology
An alternative to each server being required to confirm identities of clients who request service is to use an _______ that knows the passwords of all users and stores them in a centralized database.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology