Multiple Choice
_____ can be either software-based or deployed via hardware, such as a recording "dongle" that is plugged in between a keyboard and a PC.
A) Shadow-keyboards
B) Bootloggers
C) KitRoots
D) Keyloggers
E) Adwares
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q10: Describe briefly a few of the physical
Q11: According to research firm Gartner, the majority
Q12: Attacks that exhaust all possible password combinations
Q28: Some of the most common guidelines issued
Q29: Several surprising findings were revealed in the
Q35: Almost all security breaches can be traced
Q51: One of the reasons one should be
Q56: Web sites of reputed companies can also
Q57: Worms require an executable (a running program)
Q75: When using a public wireless network, using