Which category comprises software installed remotely via network or email and stores logs on the hard drive, sending them to an attacker via email?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which category comprises software installed remotely via network or email and stores logs on the hard drive, sending them to an attacker via email?

Explanation:
The situation describes software-based keystroke loggers. They are programs that get installed on a system through remote delivery channels like network infection or phishing emails. Once active, they record keystrokes and save the data to the local hard drive, preserving it for later retrieval. Attackers often exfiltrate those logs by sending them back to themselves via email, using a familiar, low‑friction channel that can skirt some network monitoring. This fits software keystroke loggers best because it emphasizes a userland application that persists on disk and communicates exfiltrated data by email. Kernel keyloggers operate at the OS kernel level and are often pursued for stealth, not specifically described as sending logs via email. Rootkit-based loggers focus on hiding themselves and maintaining stealth at a deeper level, which isn’t the defining trait highlighted in the scenario. Hardware or firmware keyloggers aren’t implied here since the delivery and storage model described points to an installed software component rather than a physical device.

The situation describes software-based keystroke loggers. They are programs that get installed on a system through remote delivery channels like network infection or phishing emails. Once active, they record keystrokes and save the data to the local hard drive, preserving it for later retrieval. Attackers often exfiltrate those logs by sending them back to themselves via email, using a familiar, low‑friction channel that can skirt some network monitoring.

This fits software keystroke loggers best because it emphasizes a userland application that persists on disk and communicates exfiltrated data by email. Kernel keyloggers operate at the OS kernel level and are often pursued for stealth, not specifically described as sending logs via email. Rootkit-based loggers focus on hiding themselves and maintaining stealth at a deeper level, which isn’t the defining trait highlighted in the scenario. Hardware or firmware keyloggers aren’t implied here since the delivery and storage model described points to an installed software component rather than a physical device.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy