Which of the following malware types uses stealth techniques to conceal itself, cannot install itself without user interaction, and cannot automatically propagate?
A. Rootkit
B. Logic bomb
C. Adware
D. Virus
Answer: A. Rootkit
You might also like to view...
What is the output of the following code?
int list[5] = {4, 7, 5, 3, 0}; int x = 3; list[x] = list[2 * x – 4]; list[x+1] += 6; list[x-1] = list[x-2]; cout << list[1] << list[2] << list[3] << list[4];
A __________ is an example of a NORMA system.
a) network of computers b) system with a large number of processors that share physical memory. Access to memory modules local to a processor is much faster than access to global memory modules. c) distributed system d) dual-processor personal computer
Using a domain proxy is one of the ways organizations can use to protect their identity
Indicate whether the statement is true or false.
The report generator in ProDiscover defaults to ______________________, which can be opened by most word processors.?
A. ?HyperText Markup Language (HTML) B. ?Rich Text Format (RTF) C. ?Extensible Markup Language (XML) D. ?Microsoft Word document format