Explain one way rootkits operate.

What will be an ideal response?


One approach used by rootkits is to alter or replace operating system files with modified versions that are specifically designed to ignore malicious evidence. For example, antimalware scanning software may be instructed to examine all files in a specific directory. In order to do this, the scanning software receives a list of those files from the operating system. A rootkit replaces the operating system's program that creates an accurate list of files with the rootkit's own routine that creates a list of files but omits any malicious files from the list.

Computer Science & Information Technology

You might also like to view...

A(n) _________ begins the body of every function and a(n) __________ ends the body.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following statements are correct?

a. new Scene(new Button("OK")); b. new Scene(new Circle()); c. new Scene(new ImageView()); d. new Scene(new Pane());

Computer Science & Information Technology

When copying and pasting information from the Web into a report or presentation, it is important to consider who owns the ________ to the materials

A) copyright B) trademark C) index D) patent

Computer Science & Information Technology

One of the reasons to have job rotation implemented is to increase employee boredom

Indicate whether the statement is true or false

Computer Science & Information Technology