Which rootkit intercepts system calls and modifies them as required?

a. Flea
b. T0rm
c. Adorn
d. LKM


ANS: C

Computer Science & Information Technology

You might also like to view...

For non-Windows 8 applications, you may need to add a tile to the Notification area

Indicate whether the statement is true or false

Computer Science & Information Technology

A paragraph style can be applied to an entire paragraph or only a portion of a paragraph

Indicate whether the statement is true or false

Computer Science & Information Technology

When you save an Excel workbook as an earlier version of Excel, what appears in the title bar when you open the file?

A. Enable Worksheet B. [Protected] C. [Compatibility Mode] D. The version number of Excel

Computer Science & Information Technology

What is a shortcut trust and why might you need one?

What will be an ideal response?

Computer Science & Information Technology