Short Answer
________-control software monitors and records computer transactions as they happen,so they can be traced and identify suspicious computer activity after the fact.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q36: The Code Red worm attacked servers running
Q37: _ is defined as any crime completed
Q38: What is the most common tool used
Q39: Match the Act on the left to
Q40: Using deception to get individuals to reveal
Q42: A virus that is programmed to destroy
Q43: An encryption _ is the secret numerical
Q44: What is the name of an application
Q45: The typical computer criminal is a(n)<br>A)young hacker.<br>B)trusted
Q46: An account that has additional access privileges