The _____ code of a rootkit gets the rootkit installation started and can be activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file.
a. dropper
b. loader
c. linker
d. adapter
a. dropper
Rootkits are one part of a blended threat, consisting of a dropper, a loader, and a rootkit. The dropper code gets the rootkit installation started and can be activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file. The dropper launches the loader program and then deletes itself.
You might also like to view...
To open the Insert Picture dialog box, click the ____ tab on the Ribbon and then click the Pictures button in the Images group.
A. INSERT B. ASSETS C. FORMAT D. OPTIONS
____ devices store files permanently so you can retrieve them later.?
A. ?Encrypting B. ?Storage C. ?Firewall D. ?Platform
Background images are files that enhance background colors.
Answer the following statement true (T) or false (F)
In a ____________ file, a record typically stored in order by a record-key field.
a) chronological b) non-sequential c) sequential d) record-key