Which type of rootkit replaces a binary with a Trojan version?
a. Loadable kernel module
b. Traditional
c. Backdoor
d. Executable rootkit
ANS: B
Computer Science & Information Technology
You might also like to view...
The deployment of practices is supported by ____.
A. design B. management C. evaluation D. implementation
Computer Science & Information Technology
The ____ protocol is used to open a user's e-mail client and address a new message.
A. ftp B. news C. file D. mailto
Computer Science & Information Technology
The chief rival to Intel in the PC chip market is AMD.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
You can enter a(n) _________ in the Name box to select a range in the worksheet. A. range formula B. range data C. range reference D. range function
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology