Which of the following is created after an attack and usually hides within the OS tools, so it is almost impossible to detect?

A. toolbox
B. rootkit
C. shell
D. macro virus


Answer: B

Computer Science & Information Technology

You might also like to view...

________ provide form templates that can be used to create forms quickly

Fill in the blank(s) with correct word

Computer Science & Information Technology

The time to access a memory without cache is n?tm, where n is the number of accesses and tm the memory access time. The total time to access memory is the time due to cache accesses plus the time due to main memory accesses, that is, n?(tc?h + tm?m), where h is the hit rate and m the miss rate. The speedup ratio is n?tm/(n.(tc?h + tm?m)) = tm/(tc.h + tm?m). However, m = 1 ? h because h + m = 1 (an access is either a hit or a miss). Speedup ratio = tm/(tc?h + tm?(1 ? h)) = 1/(h?tc/tm + 1 ? h) = 1/(h?k + 1 ? h) where tc/tm = k.

a. tm = 70 ns, tc = 7 ns, h = 0.9 b. tm = 60 ns, tc = 3 ns, h = 0.9 c. tm = 60 ns, tc = 3 ns, h = 0.8 d. tm = 60 ns, tc = 3 ns, h = 0.97

Computer Science & Information Technology

A(n) ____________________ account is an account used to connect to an e-mail service.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following represents the directory permissions to provide least privilege for publicly readable directories on a Unix web server?

A. rwxrwxrwx (777) B. rwxrwx-w- (772) C. rwxrwxr-x (775) D. rwxrwx-x (771)

Computer Science & Information Technology