Author Question: A __________ is a set of hacker tools used after an attacker has broken into a computer system and ... (Read 49 times)

littleanan

  • Hero Member
  • *****
  • Posts: 575
A __________ is a set of hacker tools used after an attacker has broken into a computer system and gained root-level access.
 
  What will be an ideal response?

Question 2

__________ capture keystrokes on a compromised system.
 
  What will be an ideal response?



britb2u

  • Sr. Member
  • ****
  • Posts: 331
Answer to Question 1

rootkit

Answer to Question 2

Keyloggers



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

There are 60,000 miles of blood vessels in every adult human.

Did you know?

There are over 65,000 known species of protozoa. About 10,000 species are parasitic.

Did you know?

For about 100 years, scientists thought that peptic ulcers were caused by stress, spicy food, and alcohol. Later, researchers added stomach acid to the list of causes and began treating ulcers with antacids. Now it is known that peptic ulcers are predominantly caused by Helicobacter pylori, a spiral-shaped bacterium that normally exist in the stomach.

Did you know?

According to the CDC, approximately 31.7% of the U.S. population has high low-density lipoprotein (LDL) or "bad cholesterol" levels.

Did you know?

The average person is easily confused by the terms pharmaceutics and pharmacology, thinking they are one and the same. Whereas pharmaceutics is the science of preparing and dispensing drugs (otherwise known as the science of pharmacy), pharmacology is the study of medications.

For a complete list of videos, visit our video library