A Trojan horse that sorts through files on the victim's computer to look for useable information is called ________.
A) a keystroke logger
B) data mining software
C) Both A and B
D) Neither A nor B
Correct Answer:
Verified
Q24: A program that can capture passwords as
Q25: Which of the following tends to be
Q26: Malware programs that masquerade as system files
Q27: Pieces of code that are executed after
Q28: Unsolicited commercial e-mail is better known as
Q30: Trojan horses get onto computers by _.
A)viruses
B)hackers
C)Both
Q31: Tricking users into doing something against their
Q32: The general name for malware on a
Q33: Trojan horses can get onto computers by
Q34: Credit card number thieves are called _.(Pick
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents