1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yuradex [85]
2 years ago
11

A few computers at a high-security software firm location have been compromised. The threat actor took user videos, confidential

information like bank account ids and passwords, email ids and passwords, and computer screenshots. These confidential data have been shared every three hours from the computers to the threat actor. Which of the following is correct, based on the evaluation of the above observation?.
SAT
1 answer:
DochEvi [55]2 years ago
8 0

Based on an evaluation of the given observation, the correct statement is: C. This is a software keylogger attack, as screenshots, video captures, and keystrokes have been routinely monitored and periodically shared.

<h3>What is a keylogger?</h3>

A keylogger is defined as a keystroke logger or even a keyboard capture that is an activity-monitoring software designed and developed to monitor, record and share a user's personal data with a cyber attacker or hacker.

In Cybersecurity, there are two main types of keyloggers which are;

  • Hardware keylogger
  • Software keylogger

In this question, a software keylogger is the one that was used in the attack because screenshots, email ids and passwords, video captures, and keystrokes were routinely monitored and periodically shared with the attacker.

Read more about Keylogger at; brainly.com/question/26343454

You might be interested in
Why do people always think that they can talk when the teacher is talking?
Whitepunk [10]

Answer:

because they think they're entitled

Explanation:

I just explained it

3 0
2 years ago
1+1=<br> just like the question and give brainliest please i need points
schepotkina [342]

Answer:

2

Explanation:

7 0
3 years ago
Read 2 more answers
To provide a smooth transition at the beginning of the paragraph, what is the most effective sentence to add? For example, it’s
Brilliant_brown [7]

Answer:

Explanation:

Just make a sizziling sound

8 0
2 years ago
Read 2 more answers
Siapakah tokoh seni ragam hias??
Leto [7]
English please and thankyou
4 0
3 years ago
Read 2 more answers
In a certain isosceles triangle, the base is $1\frac 12$ times as long as each leg and the perimeter is $63. $ how long is the b
V125BC [204]

The length of the base of the isosceles triangle is: 27 units long.

<h3>What is an isosceles Triangle?</h3>

A triangle with two equal legs and a base is called an isosceles triangle.

Thus:

Let x represent the length of each of the equal legs of the isosceles triangle.

Therefore:

The length of the base = 1 1/2(x) = 1.5x units

Perimeter = 63

Therefore:

x + x + 1.5x = 63

3.5x = 63

x = 63/3.5

x = 18

The length of the base = 1.5x units

Plug in the value of x

The length of the base = 1.5(18) = 27 units

Therefore, the length of the base of the isosceles triangle is: 27 units long.

Learn more about isosceles triangle on:

brainly.com/question/11884412

7 0
2 years ago
Other questions:
  • This statement shows the ______property.
    12·2 answers
  • How many goods must be supplied to achieve equilibrium?<br> 15<br> 20<br> 25<br> 30
    9·2 answers
  • Five thousand tickets are sold at​ $1 each for a charity raffle. Tickets are to be drawn at random and monetary prizes awarded a
    5·1 answer
  • The Heisenberg uncertainty principle most directly applies to which of the
    13·2 answers
  • kiersten and her four siblings are starting their own home design business. one of their primary goals is keeping the loving rel
    8·1 answer
  • The second step in the repetition strategy is to_____________the information. a. Read c. Both of these b. Say d. None of these P
    12·1 answer
  • What is the domain of the function f(x) = mc001-1. Jpg ? mc001-2. Jpg mc001-3. Jpg mc001-4. Jpg mc001-5. Jpg.
    10·2 answers
  • Which statement best describes dickon's character in the secret garden?.
    10·1 answer
  • State the differences and similarities of the vine and johnsy
    12·1 answer
  • A programmer intended to compute (a AND b) OR c, and wrote the following code, which sometimes yields incorrect output. Why
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!