Author Question: A __________ is a set of hacker tools used after an attacker has broken into a computer system and ... (Read 50 times)

littleanan

  • Hero Member
  • *****
  • Posts: 575
A __________ is a set of hacker tools used after an attacker has broken into a computer system and gained root-level access.
 
  What will be an ideal response?

Question 2

__________ capture keystrokes on a compromised system.
 
  What will be an ideal response?



britb2u

  • Sr. Member
  • ****
  • Posts: 331
Answer to Question 1

rootkit

Answer to Question 2

Keyloggers



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

GI conditions that will keep you out of the U.S. armed services include ulcers, varices, fistulas, esophagitis, gastritis, congenital abnormalities, inflammatory bowel disease, enteritis, colitis, proctitis, duodenal diverticula, malabsorption syndromes, hepatitis, cirrhosis, cysts, abscesses, pancreatitis, polyps, certain hemorrhoids, splenomegaly, hernias, recent abdominal surgery, GI bypass or stomach stapling, and artificial GI openings.

Did you know?

Oxytocin is recommended only for pregnancies that have a medical reason for inducing labor (such as eclampsia) and is not recommended for elective procedures or for making the birthing process more convenient.

Did you know?

Cutaneous mucormycosis is a rare fungal infection that has been fatal in at least 29% of cases, and in as many as 83% of cases, depending on the patient's health prior to infection. It has occurred often after natural disasters such as tornados, and early treatment is essential.

Did you know?

The Babylonians wrote numbers in a system that used 60 as the base value rather than the number 10. They did not have a symbol for "zero."

Did you know?

In women, pharmacodynamic differences include increased sensitivity to (and increased effectiveness of) beta-blockers, opioids, selective serotonin reuptake inhibitors, and typical antipsychotics.

For a complete list of videos, visit our video library