During a routine configuration audit, a systems administrator determines that a former employee placed an executable on an application server. Once the system was isolated and diagnosed, it was determined that the executable was programmed to establish a connection to a malicious command and control server. Which of the following forms of malware is best described in the scenario?

A. Logic bomb
B. Rootkit
C. Back door
D. Ransomware


Answer: B. Rootkit

Computer Science & Information Technology

You might also like to view...

HTML comments are coded as ____.

A. B. /* comment */ C. !! comment !! D. ? comment ?

Computer Science & Information Technology

A chart that you create in PowerPoint is similar to a chart that you would create in ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

A(n) ____ involves determining the damage that would result from an attack and the likelihood that a vulnerability is a risk to the organization.

A. threat modeling B. risk assessment C. attack tree D. attack modeling

Computer Science & Information Technology

The video card or the integrated graphics component determines the graphics capabilities of the computer. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology