Which type of malware takes advantage of very low-level operating system functions to hide itself from all but the most aggressive of anti-malware tools?
A. Rootkit
B. Worm
C. Macro
D. Trojan horse
Answer: A
You might also like to view...
The ________ creates an instant form in a simple top-to-bottom layout with all the fields lined up in a single column
Fill in the blank(s) with correct word
A _____ is one or more statements that do not alter the execution path within an algorithm.
A. sequence B. loop C. selection D. variable
In Java, a(n) ____ is used to make system resource access decisions based on the context it encapsulates.
A. AccessController B. ACLController C. AccessPolicyContext D. AccessControlContext
The bits in the result of an expression using the ____________ operator are set to one if the corresponding bits in each operand are set to one. Otherwise, the bits are set to zero.
Fill in the blank(s) with the appropriate word(s).