At Westonci.ca, we connect you with the answers you need, thanks to our active and informed community. Get accurate and detailed answers to your questions from a dedicated community of experts on our Q&A platform. Get quick and reliable solutions to your questions from a community of experienced experts on our platform.

A few computers at a high-security software firm location have been compromised. The threat actor took user videos, confidential information like bank account ids and passwords, email ids and passwords, and computer screenshots. These confidential data have been shared every three hours from the computers to the threat actor. Which of the following is correct, based on the evaluation of the above observation?.

Sagot :

Based on an evaluation of the given observation, the correct statement is: C. This is a software keylogger attack, as screenshots, video captures, and keystrokes have been routinely monitored and periodically shared.

What is a keylogger?

A keylogger is defined as a keystroke logger or even a keyboard capture that is an activity-monitoring software designed and developed to monitor, record and share a user's personal data with a cyber attacker or hacker.

In Cybersecurity, there are two main types of keyloggers which are;

  • Hardware keylogger
  • Software keylogger

In this question, a software keylogger is the one that was used in the attack because screenshots, email ids and passwords, video captures, and keystrokes were routinely monitored and periodically shared with the attacker.

Read more about Keylogger at; https://brainly.com/question/26343454