1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aniked [119]
3 years ago
10

A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.

Computers and Technology
1 answer:
fgiga [73]3 years ago
3 0

Answer:

keylogger.

Explanation:

A keylogger can be defined as a software program or hardware device designed for monitoring and recording the keystrokes entered by an end user through the keyboard of a computer system or mobile device.

Basically, a keylogger can be installed as a software application or plugged into the USB port of a computer system, so as to illegally keep a record of all the inputs or keys pressed on a keyboard by an end user.

In order to prevent cyber hackers from gaining access to your keystrokes, you should install an anti-malware software application such as Avira, McAfee, Avast, Bitdefender, Kaspersky, etc.

An antivirus utility is a software application or program that's used to scan, detect, remove and prevent computer viruses such as Malware, Trojan horses, keyloggers, botnets, adwares etc.

In conclusion, a bot can use a keylogger to capture keystrokes on the infected machine to retrieve sensitive information.

You might be interested in
An administrator has been asked to update a flow that was created as part of a recent update. When the administrator opens the f
Luba_88 [7]

There are steps to take so as to update a flow that was created as part in recent update. What would cause the said action is that  the flow Is a before save flow.

<h3>What is a flow</h3><h3 />
  • A flow in this scenario is known to makes before-save updates and it is known to be quite similar to a before trigger.

The Before-save Flow is known to be a trigger that is done before a given operation.

See full question below

An administrator has been asked to update a flow that was created as part of a recent update. When the administrator opens the flow for edtting, the Flow Bunder toolbox offers only four elements: Assignment, Decision, Get Records, and Loop.

What would cause this?

A . The flow Is a before save flow.

B . The flow Is a screen flow.

C . The version of the flow is activate.

D . The version of the flow is inactive.

Learn more about Flow from

brainly.com/question/6532130

4 0
3 years ago
While using a web-based order form, an attacker enters an unusually large value in the Quantity field. The value he or she enter
Darina [25.2K]

Answer:

Implementing client side validation

Explanation:

Given that this type of attack is known as Integer Overflow, the best means or practices to prevent this kind of attack is " implementing client-side validation."

This is because implementing client-side validation assists to prevent the validation errors that will arise from the integer overflow thereby resulting in a reduction of the network and server load.

Hence, in this case, the correct answer is "Implementing the client-side validation."

4 0
2 years ago
Search engines enable you to
Phoenix [80]

Located web pages related to a specific subject


Please let me know if you have questions !

4 0
3 years ago
If the pc­doctor software is installed on a computer's hard drive, what two different ways can the program be started?
xeze [42]
<span> The PC-doctor software is system information tool used to diagnose and  test the computer and determine its configuration.</span>
If the PC-­doctor software is installed on a computer's hard drive, you should start the program in two different ways:<span>
1. Press function key during startup sequence
2. Start menu shortcut</span>


8 0
3 years ago
Which data type is also called a binary object?
Andrej [43]
Binary large objects(BLOb):this data type is also called a binary object, and its fields are called binary fields.
7 0
3 years ago
Read 2 more answers
Other questions:
  • Which social media marketing concept engages visitors, getting them to revisit your website and tying them to offline events for
    7·2 answers
  • Define the missing function. licenseNum is created as: (100000 * customID) + licenseYear. Sample output:
    10·2 answers
  • Insurance can help you:
    12·1 answer
  • Which window allows you to view and change your computer's system information and settings?
    9·2 answers
  • What are two reasons why tuples exist in Python?
    9·1 answer
  • Write Tic tac toe program in python for beginners pls
    10·1 answer
  • What is the correct order for writing the 3 dimensions for a 3D object? Here are the 3 dimensions:
    15·1 answer
  • Select the statement which most accurately describes the benefits and drawbacks of working from home and telecommuting.
    13·2 answers
  • can you still receive messages on messenger from a person when you deleted the conversation with them? (But not blocked them)
    14·2 answers
  • According to Chargaff's data, ________ must pair with ________, and ________ must pair with ________.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!