Arriving on the scene of a potential crime, you are asked to examine a computer. Before taking it down for transport you decide to do a live memory analysis. In the process you discover that a particularly malevolent piece of malware has been installed that will irreparably damage the file system if anyone but the original user logs on. What is the proper name for such a program?

a. Virus
b. Worm
c. Trojan horse
d. Rootkit


d.

Computer Science & Information Technology

You might also like to view...

An image from a ____ will have a cyan, magenta, yellow, and black channel.

a. digital camera b. printer c. both a. and b. d. neither a nor. b.

Computer Science & Information Technology

What device do you need to split a large network into smaller ones?

A. NIC B. hub C. router D. MAC address

Computer Science & Information Technology

Why is an Active Directory database backup that is older than the tombstone lifetime considered to be invalid?

What will be an ideal response?

Computer Science & Information Technology

A ____________ file is simply a text file that contains a list of commands that you would normally enter in a command prompt.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology