Which rootkit intercepts system calls and modifies them as required?
a. Flea
b. T0rm
c. Adorn
d. LKM
ANS: C
Computer Science & Information Technology
You might also like to view...
For non-Windows 8 applications, you may need to add a tile to the Notification area
Indicate whether the statement is true or false
Computer Science & Information Technology
A paragraph style can be applied to an entire paragraph or only a portion of a paragraph
Indicate whether the statement is true or false
Computer Science & Information Technology
When you save an Excel workbook as an earlier version of Excel, what appears in the title bar when you open the file?
A. Enable Worksheet B. [Protected] C. [Compatibility Mode] D. The version number of Excel
Computer Science & Information Technology
What is a shortcut trust and why might you need one?
What will be an ideal response?
Computer Science & Information Technology