Which of the following types of attacks precedes the installation of a rootkit on a server?
A. Pharming
B. DDoS
C. Privilege escalation
D. DoS
Answer: C. Privilege escalation
You might also like to view...
If there exists a class named Person and one wants to create a new class named Student based on the Person class, what code segment below shows the correct way to do so?
a. Public Class Student Inherits Person b. Public Class Student Extends Person c. Public Class Student Inherits From Person d. Public Class Student :Person
Use the ________ button to revert to original formatting on a slide
A) Delete All Formatting B) Clear C) Clear All Formatting D) Delete
In a ________ network, each node connected to the network communicates directly with every other node.
A. client/server B. peer-to-peer C. router D. bridge
When transforming objects, the Set vertical skew text box allows you to determine the angle of vertical distortion.
Answer the following statement true (T) or false (F)