Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CITM-001 Topic 6 Question 5 Discussion

Actual exam question for GAQM's CITM-001 exam
Question #: 5
Topic #: 6
[All CITM-001 Questions]

A malicious program that records a user's keystrokes is an example of:

Show Suggested Answer Hide Answer
Suggested Answer: A

A malicious program that records a user's keystrokes is an example of aTrojan horse. A Trojan horse is a type of malware that masquerades as a legitimate file or application, but secretly performs malicious actions in the background. A Trojan horse can be used to install other malware, such as keyloggers, on the victim's device. A keylogger is a specific type of Trojan horse that captures and sends the user's keystrokes to a remote attacker, who can use them to steal sensitive information, such as passwords, credit card numbers, or personal data.

The other options are not correct because:

Adware is a type of malware that displays unwanted advertisements on the user's device, often redirecting them to malicious websites or installing more malware. Adware does not necessarily record the user's keystrokes, although some adware may have keylogging capabilities.

An anti-virus program is a software that protects the user's device from malware, such as viruses, worms, ransomware, spyware, etc. An anti-virus program does not record the user's keystrokes, but rather scans and removes any malicious programs that may do so.

A performance monitor is a software that measures and displays the performance of the user's device, such as CPU usage, memory usage, disk space, network traffic, etc. A performance monitor does not record the user's keystrokes, but rather provides useful information for troubleshooting or optimizing the device.


CITM Study Guide, Chapter 7: IT Security Management, pp. 131-132

What Is a keylogger and how to detect keystroke logging - Norton

Keylogger: how to recover the infected pc? - Panda Security

Contribute your Thoughts:

Alyce
4 months ago
A performance monitor, really? That's about as useful as a chocolate teapot in this case. I'm going with the Trojan horse option.
upvoted 0 times
Hoa
3 months ago
Definitely not adware or an anti-virus program in this case.
upvoted 0 times
...
Brandon
3 months ago
Trojan horse is the way to go for sure.
upvoted 0 times
...
Candra
3 months ago
Yeah, a performance monitor wouldn't help with a keylogger at all.
upvoted 0 times
...
Heike
3 months ago
I agree, a Trojan horse is definitely the correct answer.
upvoted 0 times
...
Dana
3 months ago
Yeah, a performance monitor wouldn't help with a keylogger at all.
upvoted 0 times
...
Deandrea
3 months ago
I agree, a Trojan horse is definitely the correct answer.
upvoted 0 times
...
...
Noel
4 months ago
Hold up, I think it might be an anti-virus program. Isn't that what they do, monitor our keystrokes to keep us safe? Or maybe I'm just watching too much TV.
upvoted 0 times
...
Domonique
4 months ago
Hmm, I'm pretty sure it's a Trojan horse. Keylogging is just the kind of underhanded tactic those sneaky Trojans would use.
upvoted 0 times
...
Carmelina
4 months ago
This one's a no-brainer! A Trojan horse, for sure. Who would fall for adware nowadays?
upvoted 0 times
Bettina
3 months ago
No doubt about it, it's a Trojan horse.
upvoted 0 times
...
Latricia
3 months ago
Adware is so outdated, it's definitely a Trojan horse.
upvoted 0 times
...
Heike
3 months ago
Yeah, Trojan horse all the way.
upvoted 0 times
...
Arlen
3 months ago
Trojan horse, no doubt about it.
upvoted 0 times
...
Elouise
4 months ago
Yeah, Trojan horse is the correct answer.
upvoted 0 times
...
Merilyn
4 months ago
I agree, definitely a Trojan horse.
upvoted 0 times
...
Daniel
4 months ago
I agree, definitely a Trojan horse.
upvoted 0 times
...
...
Kristeen
4 months ago
I'm not sure, but I think it could also be B) adware, since it can track user activity.
upvoted 0 times
...
Sue
5 months ago
I agree with Aide, because a Trojan horse is designed to deceive users and steal information.
upvoted 0 times
...
Aide
5 months ago
I think it's A) a Trojan horse.
upvoted 0 times
...

Save Cancel