Which of the following methods of malware delivery is used in computer programs to bypass normal authentication?

A. Privilege escalation
B. Active interception
C. Backdoor
D. Rootkit


C. Backdoors bypass normal authentication. They are used by attackers to make changes to network devices, websites, or other programs. Privilege escalation is the act of exploiting a bug or design flaw in software. Active interception is the capturing of information by a computer placed between the sender and the receiver. A rootkit is software designed to gain administrator-level control over a computer system without being detected.

Computer Science & Information Technology

You might also like to view...

Which of the following statements is valid?

A. int i(30); B. int i[4] = {3, 4, 3, 2}; C. int i[] = {3, 4, 3, 2}; D. double d[30]; E. int[] i = {3, 4, 3, 2};

Computer Science & Information Technology

In a controller-based architecture lightweight access points are replaced by autonomous APs.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The modified insertion sort introduced in 1959 by D. E. Shell is known as the diminishing return sort.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The only way to increase traffic to your website is to register it with the most popular search engine.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology