QUESTION IMAGE
Question
which of the following techniques might be used in covert surveillance? (choose all that apply.)
□ a. keylogging
□ b. data sniffing
□ c. network logs
□ d. event logs
Brief Explanations
- Keylogging secretly records keystrokes, a classic covert surveillance method.
- Data sniffing captures network traffic without detection, used for covert monitoring.
- Network logs are official records of network activity, not covert surveillance tools.
- Event logs track system events openly, not a covert surveillance technique.
Snap & solve any problem in the app
Get step-by-step solutions on Sovi AI
Photo-based solutions with guided steps
Explore more problems and detailed explanations
a. Keylogging
b. Data sniffing