What type of device is inserted between the computer keyboard connection and USB port for the purposes of stealing information?
A. rootkit
B. backdoor
C. keylogger
D. zombie
Answer: C
Computer Science & Information Technology
You might also like to view...
Match the following basic table terms and descriptions:
I. Cell II. Quick Tables III. Insert control IV. Eraser V. Table A. Enables you to remove gridlines B. Enables you to select such tables as calendars or matrices C. Intersection of a column and row D. Enables you to add rows or columns E. Grid of columns and rows
Computer Science & Information Technology
Which protocol is used between the IEEE 802.1x supplicant and the authenticator?
A) SSL B) EAPoL C) RADIUS D) PPP
Computer Science & Information Technology