Arriving on the scene of a potential crime, you are asked to examine a computer. Before taking it down for transport you decide to do a live memory analysis. In the process you discover that a particularly malevolent piece of malware has been installed that will irreparably damage the file system if anyone but the original user logs on. What is the proper name for such a program?
a. Virus
b. Worm
c. Trojan horse
d. Rootkit
d. Rootkit
You might also like to view...
In order to leave 15 pixels of space in an HBox container, use which of the following statements?
a. myhbox = setPadding(15); b. myhbox.setPadding(15); c. myhbox.setPadding.Insets(15); d. myhbox.setPadding(new Insets(15));
Any content in the ________ will be rendered even if the browser doesn’t support the specified plugin.
a. SVG element b. Poster image c. Canvas element d. Source element e. Object element
When sending credit card numbers and ordering information using a SET,
(a) the information is generated for and sent directly to merchant’s bank. (b) the information is encrypted for the merchant’s bank but sent through the merchant. (c) the information is encrypted for and sent directly to the customer’s bank. (d) the information is encrypted for and sent directly to the merchant.
To retrieve specific columns from a table, use _________ to separate the column names.
a. ? b. * c. , d. -