Which of the following is created after an attack and usually hides within the OS tools, so it is almost impossible to detect?
A. toolbox
B. rootkit
C. shell
D. macro virus
Answer: B
You might also like to view...
________ provide form templates that can be used to create forms quickly
Fill in the blank(s) with correct word
The time to access a memory without cache is n?tm, where n is the number of accesses and tm the memory access time. The total time to access memory is the time due to cache accesses plus the time due to main memory accesses, that is, n?(tc?h + tm?m), where h is the hit rate and m the miss rate. The speedup ratio is n?tm/(n.(tc?h + tm?m)) = tm/(tc.h + tm?m). However, m = 1 ? h because h + m = 1 (an access is either a hit or a miss). Speedup ratio = tm/(tc?h + tm?(1 ? h)) = 1/(h?tc/tm + 1 ? h) = 1/(h?k + 1 ? h) where tc/tm = k.
a. tm = 70 ns, tc = 7 ns, h = 0.9 b. tm = 60 ns, tc = 3 ns, h = 0.9 c. tm = 60 ns, tc = 3 ns, h = 0.8 d. tm = 60 ns, tc = 3 ns, h = 0.97
A(n) ____________________ account is an account used to connect to an e-mail service.
Fill in the blank(s) with the appropriate word(s).
Which of the following represents the directory permissions to provide least privilege for publicly readable directories on a Unix web server?
A. rwxrwxrwx (777) B. rwxrwx-w- (772) C. rwxrwxr-x (775) D. rwxrwx-x (771)