This type of Trojan takes advantage of very low-level operating system functions to hide itself from most less-sophisticated anti-malware tools.

A. rootkit
B. macro
C. worm
D. Trojan


Answer: A

Computer Science & Information Technology

You might also like to view...

Data values do not need to be tested or validated before they are used.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

For each of the following expressions, indicate the order in which the operators will be evaluated by writing a number beneath each operator.

a. a – b – c – d b. a – b + c – d c. a + b / c / d d. a + b / c * d e. a / b * c * d f. a % b / c * d g. a % b % c % d h. a – (b – c) – d i. (a – (b – c)) – d j. a – ((b – c) – d) k. a % (b % c) * d * e l. a + (b – c) * d – e m. (a + b) * c + d * e n. (a + b) * (c / d) % e

Computer Science & Information Technology

In Outlook, the task list a checklist that allows you to list what needs to be done and check the items off as they are completed

Indicate whether the statement is true or false

Computer Science & Information Technology

Ken changed the inputs to his model, then checked the results. He is using ____ analysis

a. heuristics b. what-if c. optimization model d. time compression

Computer Science & Information Technology