Author Question: A __________ is a set of hacker tools used after an attacker has broken into a computer system and ... (Read 91 times)

littleanan

  • Hero Member
  • *****
  • Posts: 575
A __________ is a set of hacker tools used after an attacker has broken into a computer system and gained root-level access.
 
  What will be an ideal response?

Question 2

__________ capture keystrokes on a compromised system.
 
  What will be an ideal response?



britb2u

  • Sr. Member
  • ****
  • Posts: 331
Answer to Question 1

rootkit

Answer to Question 2

Keyloggers



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

When blood is exposed to air, it clots. Heparin allows the blood to come in direct contact with air without clotting.

Did you know?

The term pharmacology is derived from the Greek words pharmakon("claim, medicine, poison, or remedy") and logos ("study").

Did you know?

To prove that stomach ulcers were caused by bacteria and not by stress, a researcher consumed an entire laboratory beaker full of bacterial culture. After this, he did indeed develop stomach ulcers, and won the Nobel Prize for his discovery.

Did you know?

There are over 65,000 known species of protozoa. About 10,000 species are parasitic.

Did you know?

Approximately 500,000 babies are born each year in the United States to teenage mothers.

For a complete list of videos, visit our video library