Q. An intruder might install this on a networked computer to collect user ids andpasswords from other machines on the network. (Solved)
1. Passphrase
2. Root kit
3. Ownership tag
4. Token
- b. Root kit
1. Passphrase
2. Root kit
3. Ownership tag
4. Token