Which type of malware takes advantage of very low-level operating system functions to hide itself from all but the most aggressive of anti-malware tools?

A. Rootkit
B. Worm
C. Macro
D. Trojan horse


Answer: A

Computer Science & Information Technology

You might also like to view...

The ________ creates an instant form in a simple top-to-bottom layout with all the fields lined up in a single column

Fill in the blank(s) with correct word

Computer Science & Information Technology

A _____ is one or more statements that do not alter the execution path within an algorithm.

A. sequence B. loop C. selection D. variable

Computer Science & Information Technology

In Java, a(n) ____ is used to make system resource access decisions based on the context it encapsulates.

A. AccessController B. ACLController C. AccessPolicyContext D. AccessControlContext

Computer Science & Information Technology

The bits in the result of an expression using the ____________ operator are set to one if the corresponding bits in each operand are set to one. Otherwise, the bits are set to zero.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology