Get the answers you need at Westonci.ca, where our expert community is dedicated to providing you with accurate information. Our platform provides a seamless experience for finding precise answers from a network of experienced professionals. Experience the convenience of finding accurate answers to your questions from knowledgeable experts on our platform.

A few computers at a high-security software firm location have been compromised. The threat actor took user videos, confidential information like bank account ids and passwords, email ids and passwords, and computer screenshots. These confidential data have been shared every three hours from the computers to the threat actor. Which of the following is correct, based on the evaluation of the above observation?.

Sagot :

Based on an evaluation of the given observation, the correct statement is: C. This is a software keylogger attack, as screenshots, video captures, and keystrokes have been routinely monitored and periodically shared.

What is a keylogger?

A keylogger is defined as a keystroke logger or even a keyboard capture that is an activity-monitoring software designed and developed to monitor, record and share a user's personal data with a cyber attacker or hacker.

In Cybersecurity, there are two main types of keyloggers which are;

  • Hardware keylogger
  • Software keylogger

In this question, a software keylogger is the one that was used in the attack because screenshots, email ids and passwords, video captures, and keystrokes were routinely monitored and periodically shared with the attacker.

Read more about Keylogger at; https://brainly.com/question/26343454