Arriving on the scene of a potential crime, you are asked to examine a computer. Before taking it down for transport you decide to do a live memory analysis. In the process you discover that a particularly malevolent piece of malware has been installed that will irreparably damage the file system if anyone but the original user logs on. What is the proper name for such a program?
a. Virus
b. Worm
c. Trojan horse
d. Rootkit
d.
Computer Science & Information Technology
You might also like to view...
An image from a ____ will have a cyan, magenta, yellow, and black channel.
a. digital camera b. printer c. both a. and b. d. neither a nor. b.
Computer Science & Information Technology
What device do you need to split a large network into smaller ones?
A. NIC B. hub C. router D. MAC address
Computer Science & Information Technology
Why is an Active Directory database backup that is older than the tombstone lifetime considered to be invalid?
What will be an ideal response?
Computer Science & Information Technology
A ____________ file is simply a text file that contains a list of commands that you would normally enter in a command prompt.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology