Welcome to Westonci.ca, where your questions are met with accurate answers from a community of experts and enthusiasts. Explore thousands of questions and answers from a knowledgeable community of experts on our user-friendly platform. Join our platform to connect with experts ready to provide precise answers to your questions in different areas.

A few computers at a high-security software firm location have been compromised. The threat actor took user videos, confidential information like bank account ids and passwords, email ids and passwords, and computer screenshots. These confidential data have been shared every three hours from the computers to the threat actor. Which of the following is correct, based on the evaluation of the above observation?.

Sagot :

Based on an evaluation of the given observation, the correct statement is: C. This is a software keylogger attack, as screenshots, video captures, and keystrokes have been routinely monitored and periodically shared.

What is a keylogger?

A keylogger is defined as a keystroke logger or even a keyboard capture that is an activity-monitoring software designed and developed to monitor, record and share a user's personal data with a cyber attacker or hacker.

In Cybersecurity, there are two main types of keyloggers which are;

  • Hardware keylogger
  • Software keylogger

In this question, a software keylogger is the one that was used in the attack because screenshots, email ids and passwords, video captures, and keystrokes were routinely monitored and periodically shared with the attacker.

Read more about Keylogger at; https://brainly.com/question/26343454