Sovi.AI - AI Math Tutor

Scan to solve math questions

QUESTION IMAGE

which of the following techniques might be used in covert surveillance?…

Question

which of the following techniques might be used in covert surveillance? (choose all that apply.)
□ a. keylogging
□ b. data sniffing
□ c. network logs
□ d. event logs

Explanation:

Brief Explanations
  • Keylogging secretly records keystrokes, a classic covert surveillance method.
  • Data sniffing captures network traffic without detection, used for covert monitoring.
  • Network logs are official records of network activity, not covert surveillance tools.
  • Event logs track system events openly, not a covert surveillance technique.

Answer:

a. Keylogging
b. Data sniffing