____ are a form of Trojan programs that can monitor traffic to and from a computer, monitor keystrokes, and capture passwords.
A) Worms
B) Rootkits
C) Backdoors
D) Packet sniffers
Correct Answer:
Verified
Q18: Windows OSs _ permissions are applied to
Q19: An intrusion detection system (IDS)usually works with
Q20: Spam is simply unsolicited e-mail.
Q21: In Windows XP, Vista, and Server 2003,
Q22: What are the basic guidelines that a
Q24: What are the elements of a security
Q25: Firewalls can attempt to determine the context
Q26: A _ is a program that spreads
Q27: _ monitors or in some way controls
Q28: What is a highly restrictive security policy?
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents