Author Question: A __________ is a set of hacker tools used after an attacker has broken into a computer system and ... (Read 34 times)

littleanan

  • Hero Member
  • *****
  • Posts: 575
A __________ is a set of hacker tools used after an attacker has broken into a computer system and gained root-level access.
 
  What will be an ideal response?

Question 2

__________ capture keystrokes on a compromised system.
 
  What will be an ideal response?



britb2u

  • Sr. Member
  • ****
  • Posts: 331
Answer to Question 1

rootkit

Answer to Question 2

Keyloggers



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Fatal fungal infections may be able to resist newer antifungal drugs. Globally, fungal infections are often fatal due to the lack of access to multiple antifungals, which may be required to be utilized in combination. Single antifungals may not be enough to stop a fungal infection from causing the death of a patient.

Did you know?

ACTH levels are normally highest in the early morning (between 6 and 8 A.M.) and lowest in the evening (between 6 and 11 P.M.). Therefore, a doctor who suspects abnormal levels looks for low ACTH in the morning and high ACTH in the evening.

Did you know?

Normal urine is sterile. It contains fluids, salts, and waste products. It is free of bacteria, viruses, and fungi.

Did you know?

After a vasectomy, it takes about 12 ejaculations to clear out sperm that were already beyond the blocked area.

Did you know?

The highest suicide rate in the United States is among people ages 65 years and older. Almost 15% of people in this age group commit suicide every year.

For a complete list of videos, visit our video library