Multiple Choice
Match each item with a statement below.
-Hardware devices or software that can be used to capture keystrokes on a computer
A) botnet
B) rootkit
C) Trojan
D) Ping of Death
E) DoS
F) Man-in-the-Middle
G) keyloggers
H) malware
I) virus
J) ransomware
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q28: What is a DDoS attack?
Q29: Match each item with a statement below.<br>-Malicious
Q30: Describe the basic function and creation process
Q31: A DDoS attack is launched against a
Q32: A computer hacker may use a phishing
Q34: Which term best describes a hash or
Q35: What type of attack is occurring when
Q36: The virus signature file is maintained by
Q37: Explain how the two different types of
Q38: Which of the following physical security methods