Which popular rootkit breaks netstat and ps binary in 31336 bytes?
a. Flea
b. T0rm
c. Adorn
d. LKM
ANS: B
You might also like to view...
Answer the following statements true (T) or false (F)
1. In an MS-DOS COPY command, if no file name is specified for the destination file, the source file name is used. 2. Under MS-DOS, a programmer must specify a file’s size when the file is first created. 3. When wild card characters are used in an MS-DOS file name, a question mark (?) represents any single character. 4. When wild card characters are used in an MS-DOS file name, an asterisk (*) represents multiple characters. 5. A batch file is a file of pre-coded MS-DOS commands.
In relational database theory, a table is also known as a:
a. column b. key c. relation d. attribute
Private browsing does not store data on
a. the computer itself b. the server c. both the computer itself and the server d. neither the computer itself or the server
Following the rules for the order of operations, what is the result of the following expression:
(9 * 5 ) + 5 + 10 - 10 * 6 A) 540 B) 25 C) 0 D) 40