Which of the following types of attacks precedes the installation of a rootkit on a server?

A. Pharming
B. DDoS
C. Privilege escalation
D. DoS


Answer: C. Privilege escalation

Computer Science & Information Technology

You might also like to view...

If there exists a class named Person and one wants to create a new class named Student based on the Person class, what code segment below shows the correct way to do so?

a. Public Class Student Inherits Person b. Public Class Student Extends Person c. Public Class Student Inherits From Person d. Public Class Student :Person

Computer Science & Information Technology

Use the ________ button to revert to original formatting on a slide

A) Delete All Formatting B) Clear C) Clear All Formatting D) Delete

Computer Science & Information Technology

In a ________ network, each node connected to the network communicates directly with every other node.

A. client/server B. peer-to-peer C. router D. bridge

Computer Science & Information Technology

When transforming objects, the Set vertical skew text box allows you to determine the angle of vertical distortion.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology