Briefly describe the dangers of a rootkit.

What will be an ideal response?


A rootkit is malware that permits viruses and spyware to be installed on a user's PC without their knowledge or consent.  A rootkit is activated during a PC's start-up processes and may install software that captures keystrokes and mouse clicks, which can then be transmitted to another user's PC, again, without the user's knowledge or consent.  Rootkits are difficult to detect because the files and folders that are part of the rootkit are normally invisible to the infected PC.

Computer Science & Information Technology

You might also like to view...

What type of encryption algorithm uses the same key to encrypt data and decrypt data?

A. asymmetric B. symmetric C. signing D. hash

Computer Science & Information Technology

Which PC design would most likely contain an SSD?

A) HTPC B) Home server C) Thick client D) CAD/CAM E) Mobile

Computer Science & Information Technology

Describe the relationships among software engineering process, methods, and tools.

What will be an ideal response?

Computer Science & Information Technology

What two accounts are created when Windows is first installed?

A. Groups B. Guest C. Administrator D. Domain

Computer Science & Information Technology