Which of the following attacks installs a key logger on the victim's system in an attempt to collect usernames and passwords?
A. IP spoofing attack
B. Denial-of-service attack
C. Rogue code attack
D. Emanation eavesdropping attack
Answer: C
Explanation: In a rouge code attack, the victim without his knowledge installs a key logger that collects sensitive information, such as username and passwords.
Computer Science & Information Technology
You might also like to view...
The ________ master contains design information for pages that the presenter might use
Fill in the blank(s) with correct word
Computer Science & Information Technology
Under what menu within VirtualBox can a virtual appliance be exported?
A. File Menu B. Machine Menu C. Settings Menu D. Preferences Menu
Computer Science & Information Technology