What kind of software could Harold use to accomplish this?

Harold just got home from working at Henderson LLC where he works as an IT technician. He was able to get off early because they were not too busy. When he walks into his home office, he notices his teenage daughter on the computer, apparently chatting with someone online. As soon as she hears Harold enter the room, she closes all her windows and tries to act like she was playing a game. When Harold asks her what she was doing, she acts very nervous and does not give him a straight answer. Harold is very concerned because he does not want his daughter to fall victim to online predators and the sort. Harold doesn’t necessarily want to install any programs that will restrict the sites his daughter goes to, because he doesn’t want to alert her to his trying to figure out what she is doing. Harold wants to use some kind of program that will track her activities online, and send Harold an email of her activity once a day so he can see what she has been up to. What kind of software could Harold use to accomplish this?

Harold just got home from working at Henderson LLC where he works as an IT technician. He was able to get off early because they were not too busy. When he walks into his home office, he notices his teenage daughter on the computer, apparently chatting with someone online. As soon as she hears Harold enter the room, she closes all her windows and tries to act like she was playing a game. When Harold asks her what she was doing, she acts very nervous and does not give him a straight answer. Harold is very concerned because he does not want his daughter to fall victim to online predators and the sort. Harold doesn’t necessarily want to install any programs that will restrict the sites his daughter goes to, because he doesn’t want to alert her to his trying to figure out what she is doing. Harold wants to use some kind of program that will track her activities online, and send Harold an email of her activity once a day so he can see what she has been up to. What kind of software could Harold use to accomplish this?

A.
Install hardware Keylogger on her computer

B.
Install screen capturing Spyware on her computer

C.
Enable Remote Desktop on her computer

D.
Install VNC on her computer



Leave a Reply 9

Your email address will not be published. Required fields are marked *


Krishan

Krishan

Since she is chatting with someone online, Keylogger is the best solution. Answer A

santa

santa

They r asking for SOFTWARE solutions, alternative A involves a HARDWARE solution.

Ay

Ay

The best option is B. Usually you have more than one correct options, you choose the best.

Eddie Guerrero

Eddie Guerrero

he’s going to jail for child porn! You can’t just install this stuff without repercussions, today. A guy proved his wife was cheating, with this, and it wasn’t admissible in court (against her for divorce), because it was ruled hacking his own computer- and yes he is about to go to jail for this!

Unethica

Unethica

Yeah, this is completely unethical. The correct answer is DON’T DO IT.

Hahaha

Hahaha

Actually, he owns this computer and can install monitoring sw. It’s when it’s not your computer that it’s illegal. Meaning if it’s your wife’s personal computer=illegal.A family computer could potentially be a grey area in a divorce case but highly doubt illegal. This type of sw is used in divorce cases all the time and is admitted. It would depend on the circumstance that it be in admissible and potentially illegal. If hisndaughter was on a personal computer she purchased then it’d be illegal. Plus not all keyloggers are hw. But my cousins neighbors vet went to jail bc blah blah blah. It’s all a matter of circumstance.

Me

Me

If his daughter is underage, which she plainly is, she has no protected rights where her parents are concerned. She is not protected in any way shape or form from “privacy”, and finally, if she’s underage, as is apparent here, and lives under his roof, everything she THINKS she “owns” is legally “owned” by her parents – father in this case. Therfore, every single thing mentioned above about legality or ethics of this situation is completely irrelevant and not applicable to this case.

Jayaprakash

Jayaprakash

I can understand all your points about privacy issue. One thing you are missing here. An ethical hacker should think the way a real hacker/cracker will think. Most of the questions are about a real hacker and what he/she will do. Harold (in this question) is clearly not an ethical hacker. Without knowing what he will do, an ethical hacker will not be able to identify a screen capturing spyware is used on a computer and why. Just don’t dig too much on a question, and try the best answer. Reasoning each question will not help pass you anyway, will just confuse you more.