Which of the following malware types uses stealth techniques to conceal itself, cannot install itself without user interaction, and cannot automatically propagate?

A. Rootkit
B. Logic bomb
C. Adware
D. Virus


Answer: A. Rootkit

Computer Science & Information Technology

You might also like to view...

What is the output of the following code?

int list[5] = {4, 7, 5, 3, 0}; int x = 3; list[x] = list[2 * x – 4]; list[x+1] += 6; list[x-1] = list[x-2]; cout << list[1] << list[2] << list[3] << list[4];

Computer Science & Information Technology

A __________ is an example of a NORMA system.

a) network of computers b) system with a large number of processors that share physical memory. Access to memory modules local to a processor is much faster than access to global memory modules. c) distributed system d) dual-processor personal computer

Computer Science & Information Technology

Using a domain proxy is one of the ways organizations can use to protect their identity

Indicate whether the statement is true or false.

Computer Science & Information Technology

The report generator in ProDiscover defaults to ______________________, which can be opened by most word processors.?

A. ?HyperText Markup Language (HTML) B. ?Rich Text Format (RTF) C. ?Extensible Markup Language (XML) D. ?Microsoft Word document format

Computer Science & Information Technology