Which popular rootkit breaks netstat and ps binary in 31336 bytes?

a. Flea
b. T0rm
c. Adorn
d. LKM


ANS: B

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. In an MS-DOS COPY command, if no file name is specified for the destination file, the source file name is used. 2. Under MS-DOS, a programmer must specify a file’s size when the file is first created. 3. When wild card characters are used in an MS-DOS file name, a question mark (?) represents any single character. 4. When wild card characters are used in an MS-DOS file name, an asterisk (*) represents multiple characters. 5. A batch file is a file of pre-coded MS-DOS commands.

Computer Science & Information Technology

In relational database theory, a table is also known as a:

a. column b. key c. relation d. attribute

Computer Science & Information Technology

Private browsing does not store data on

a. the computer itself b. the server c. both the computer itself and the server d. neither the computer itself or the server

Computer Science & Information Technology

Following the rules for the order of operations, what is the result of the following expression:

(9 * 5 ) + 5 + 10 - 10 * 6 A) 540 B) 25 C) 0 D) 40

Computer Science & Information Technology