Which of the following attacks installs a key logger on the victim's system in an attempt to collect usernames and passwords?

A. IP spoofing attack
B. Denial-of-service attack
C. Rogue code attack
D. Emanation eavesdropping attack

Answer: C
Explanation: In a rouge code attack, the victim without his knowledge installs a key logger that collects sensitive information, such as username and passwords.

Computer Science & Information Technology

You might also like to view...

The ________ master contains design information for pages that the presenter might use

Fill in the blank(s) with correct word

Computer Science & Information Technology

Under what menu within VirtualBox can a virtual appliance be exported?

A. File Menu B. Machine Menu C. Settings Menu D. Preferences Menu

Computer Science & Information Technology