Which of the following malware types is BEST described as protecting itself by hooking system processes and hiding its presence?

A. Botnet
B. Rootkit
C. Logic bomb
D. Virus


Answer: B. Rootkit

Computer Science & Information Technology

You might also like to view...

Use the find command to display the names of all the header files in the /usr/include directory that are larger than 1000 bytes. Write down the command that you used to perform this task.

What will be an ideal response?

Computer Science & Information Technology

When using an HDMI to DVI adapter, what two DVI port types will the adapter work with?

A. DVI-A B. DVI-D C. DVI-I D. DVI-V

Computer Science & Information Technology

When organizations adopt security measures for a legal defense, they may need to show that they have done what any prudent organization would do in similar circumstances. This is referred to as __________.

A. baselining B. best practices C. benchmarking D. standards of due care

Computer Science & Information Technology

The backup file:

a. Is made from the old master file. b. Is important to keep. c. Does not include the updates to the master file. d. All of the above.

Computer Science & Information Technology