Which of the following defines a rootkit?

a. It is the act of fraudulently using email to try to get the recipient to reveal personal data by sending legitimate-looking emails urging the recipient to take action to avoid a negative consequence or to receive a reward.
b. It is the unintended release of sensitive data by unauthorized individuals.
c. It is the abuse of email systems to send unsolicited email to large numbers of people.
d. It is a set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge.


d. It is a set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge.
A rootkit is a set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system and even obscure the presence of the rootkit from legitimate system administrators.

Computer Science & Information Technology

You might also like to view...

Two levels is the maximum sort in Excel

Indicate whether the statement is true or false

Computer Science & Information Technology

A(n) ____ is a symbolic task used mainly to communicate progress or to mark the end of a significant phase of the project.

A. origin point B. destination C. milestone D. summation

Computer Science & Information Technology

________ sets of three, four, or five small graphic images that are useful for quickly identifying higher and lower numbers within a large group of data

Fill in the blank(s) with correct word

Computer Science & Information Technology

What term is used for a string that appears in the actual code of a program?

a. string literal b. virtual string c. str d. any of these

Computer Science & Information Technology