The _____ code of a rootkit gets the rootkit installation started and can be activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file.

a. dropper
b. loader
c. linker
d. adapter


a. dropper
Rootkits are one part of a blended threat, consisting of a dropper, a loader, and a rootkit. The dropper code gets the rootkit installation started and can be activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file. The dropper launches the loader program and then deletes itself.

Computer Science & Information Technology

You might also like to view...

To open the Insert Picture dialog box, click the ____ tab on the Ribbon and then click the Pictures button in the Images group.

A. INSERT B. ASSETS C. FORMAT D. OPTIONS

Computer Science & Information Technology

____ devices store files permanently so you can retrieve them later.?

A. ?Encrypting B. ?Storage C. ?Firewall D. ?Platform

Computer Science & Information Technology

Background images are files that enhance background colors.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In a ____________ file, a record typically stored in order by a record-key field.

a) chronological b) non-sequential c) sequential d) record-key

Computer Science & Information Technology