The term ____ refers to software tools used to conceal malware and backdoors that have been installed on a victim's computer.

A. computer virus
B. rootkit
C. Trojan horse
D. bot


Answer: B

Computer Science & Information Technology

You might also like to view...

Which part of the ADT tells the programmer using it how to use it?

a. the implementation b. the interface c. the abstractness d. the scope resolution

Computer Science & Information Technology

To draw a circle, use the ___ method.

A. drawCircle() B. drawArc() C. circle() D. arc()

Computer Science & Information Technology

This can be used to display the IP ports currently open on the Windows operating system.

What will be an ideal response?

Computer Science & Information Technology

Answer the following questions true (T) or false (F)

1. The EBP register points to the last value pushed on the runtime stack. 2. The ESP register always points to the next available position (NAP) where a new value will be pushed on the stack. 3. When the POP instruction executes, the ESP register is incremented after the value it points to is copied from the stack.

Computer Science & Information Technology