The term ____ refers to software tools used to conceal malware and backdoors that have been installed on a victim's computer.
A. computer virus
B. rootkit
C. Trojan horse
D. bot
Answer: B
You might also like to view...
Which part of the ADT tells the programmer using it how to use it?
a. the implementation b. the interface c. the abstractness d. the scope resolution
To draw a circle, use the ___ method.
A. drawCircle() B. drawArc() C. circle() D. arc()
This can be used to display the IP ports currently open on the Windows operating system.
What will be an ideal response?
Answer the following questions true (T) or false (F)
1. The EBP register points to the last value pushed on the runtime stack. 2. The ESP register always points to the next available position (NAP) where a new value will be pushed on the stack. 3. When the POP instruction executes, the ESP register is incremented after the value it points to is copied from the stack.