Which of the following malware types is BEST described as protecting itself by hooking system processes and hiding its presence?
A. Botnet
B. Rootkit
C. Logic bomb
D. Virus
Answer: B. Rootkit
You might also like to view...
Use the find command to display the names of all the header files in the /usr/include directory that are larger than 1000 bytes. Write down the command that you used to perform this task.
What will be an ideal response?
When using an HDMI to DVI adapter, what two DVI port types will the adapter work with?
A. DVI-A B. DVI-D C. DVI-I D. DVI-V
When organizations adopt security measures for a legal defense, they may need to show that they have done what any prudent organization would do in similar circumstances. This is referred to as __________.
A. baselining B. best practices C. benchmarking D. standards of due care
The backup file:
a. Is made from the old master file. b. Is important to keep. c. Does not include the updates to the master file. d. All of the above.