Multiple Choice
Intruders have been known to capture user passwords by using a ____ to replace the standard login program on the computer with an identical fake login that captures keystrokes.
A) worm
B) masquerade program
C) Trojan horse
D) virtual login console
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q2: The immediate result of a worm is
Q3: A worm is a memory-resident program that
Q4: A virus is defined as a small
Q5: The capability of a system to fulfill
Q6: A firewall typically sits between a network
Q8: A macro virus infects data files,such as
Q9: A master boot record virus infects both
Q10: Intrusion detection is an example of a
Q11: Spooling is a security threat that relies
Q12: _ viruses infect data files.<br>A) File infector<br>B)