Which type of malware is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?
A. virus
B. worm
C. hacking kit
D. rootkit
Answer: D
You might also like to view...
The destructor for a class is called
a. explicitly from the main program b. when the class is instantiated c. when the object of the class goes out of scope d. Only at the end of main
A ___________ statement terminates the current iteration of a loop.
a. Break b. Continue c. Switch d. Assert
Critical Thinking QuestionsCase 3-2Your colleague Simone has been using Business Card view because she was not aware that she could change the default view, but now she turns to you for help.Simone likes some aspects of Business Card view but would like to experiment with a similar view that presents the records smaller. Which of the following do you recommend to her? a. Micro viewc. Card viewb. List viewd. Phone view
What will be an ideal response?
The three primary types of virus attack mechanisms are master boot record, file infector, and RAM infector
Indicate whether the statement is true or false.