During a routine configuration audit, a systems administrator determines that a former employee placed an executable on an application server. Once the system was isolated and diagnosed, it was determined that the executable was programmed to establish a connection to a malicious command and control server. Which of the following forms of malware is best described in the scenario?
A. Logic bomb
B. Rootkit
C. Back door
D. Ransomware
Answer: B. Rootkit
Computer Science & Information Technology
You might also like to view...
HTML comments are coded as ____.
A. B. /* comment */ C. !! comment !! D. ? comment ?
Computer Science & Information Technology
A chart that you create in PowerPoint is similar to a chart that you would create in ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
A(n) ____ involves determining the damage that would result from an attack and the likelihood that a vulnerability is a risk to the organization.
A. threat modeling B. risk assessment C. attack tree D. attack modeling
Computer Science & Information Technology
The video card or the integrated graphics component determines the graphics capabilities of the computer. _________________________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology