Multiple Choice
A Trojan horse that sorts through files on the victim's computer to look for useable information is called ________.
A) a keystroke logger
B) data mining software
C) Both A and B
D) Neither A nor B
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q4: When a packet that is not part
Q50: Biometrics is the use of body measurements
Q99: Tricking users into doing something against their
Q100: What type of attacker can do the
Q101: Firewall log files should be read _.<br>A)every
Q102: Vulnerabilities are occasionally found in even the
Q103: SSL-TLS is a cryptographic system standard.
Q106: When a firewall identifies an attack packet,it
Q107: Mobile code is another name for _.<br>A)virus<br>B)worm<br>C)Both
Q108: Using encryption,you make it impossible for attackers