Author Question: A __________ is a set of hacker tools used after an attacker has broken into a computer system and ... (Read 27 times)

littleanan

  • Hero Member
  • *****
  • Posts: 575
A __________ is a set of hacker tools used after an attacker has broken into a computer system and gained root-level access.
 
  What will be an ideal response?

Question 2

__________ capture keystrokes on a compromised system.
 
  What will be an ideal response?



britb2u

  • Sr. Member
  • ****
  • Posts: 331
Answer to Question 1

rootkit

Answer to Question 2

Keyloggers



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Your skin wrinkles if you stay in the bathtub a long time because the outermost layer of skin (which consists of dead keratin) swells when it absorbs water. It is tightly attached to the skin below it, so it compensates for the increased area by wrinkling. This happens to the hands and feet because they have the thickest layer of dead keratin cells.

Did you know?

When Gabriel Fahrenheit invented the first mercury thermometer, he called "zero degrees" the lowest temperature he was able to attain with a mixture of ice and salt. For the upper point of his scale, he used 96°, which he measured as normal human body temperature (we know it to be 98.6° today because of more accurate thermometers).

Did you know?

Barbituric acid, the base material of barbiturates, was first synthesized in 1863 by Adolph von Bayer. His company later went on to synthesize aspirin for the first time, and Bayer aspirin is still a popular brand today.

Did you know?

Though the United States has largely rejected the metric system, it is used for currency, as in 100 pennies = 1 dollar. Previously, the British currency system was used, with measurements such as 12 pence to the shilling, and 20 shillings to the pound.

Did you know?

Serum cholesterol testing in adults is recommended every 1 to 5 years. People with diabetes and a family history of high cholesterol should be tested even more frequently.

For a complete list of videos, visit our video library