1- Alison discovers that a system under her control has been infected with malware, which is using a keylogger to report user keystrokes to a third party. What information security property is this malware attacking?
2- What file type is least likely to be impacted by a file infector virus?
3- Mary is designing a software component that will function at the Presentation Layer of the Open Systems Interconnection (OSI) model. What other two layers of the model will her component need to interact with?
a) Network and Session
b) Session and Transport
c) Application and Session