Arriving on the scene of a potential crime, you are asked to examine a computer. Before taking it down for transport you decide to do a live memory analysis. In the process you discover that a particularly malevolent piece of malware has been installed that will irreparably damage the file system if anyone but the original user logs on. What is the proper name for such a program?

a. Virus
b. Worm
c. Trojan horse
d. Rootkit


d. Rootkit

Computer Science & Information Technology

You might also like to view...

In order to leave 15 pixels of space in an HBox container, use which of the following statements?

a. myhbox = setPadding(15); b. myhbox.setPadding(15); c. myhbox.setPadding.Insets(15); d. myhbox.setPadding(new Insets(15));

Computer Science & Information Technology

Any content in the ________ will be rendered even if the browser doesn’t support the specified plugin.

a. SVG element b. Poster image c. Canvas element d. Source element e. Object element

Computer Science & Information Technology

When sending credit card numbers and ordering information using a SET,

(a) the information is generated for and sent directly to merchant’s bank. (b) the information is encrypted for the merchant’s bank but sent through the merchant. (c) the information is encrypted for and sent directly to the customer’s bank. (d) the information is encrypted for and sent directly to the merchant.

Computer Science & Information Technology

To retrieve specific columns from a table, use _________ to separate the column names.

a. ? b. * c. , d. -

Computer Science & Information Technology