Which type of rootkit replaces a binary with a Trojan version?

a. Loadable kernel module
b. Traditional
c. Backdoor
d. Executable rootkit


ANS: B

Computer Science & Information Technology

You might also like to view...

The deployment of practices is supported by ____.

A. design B. management C. evaluation D. implementation

Computer Science & Information Technology

The ____ protocol is used to open a user's e-mail client and address a new message.

A. ftp B. news C. file D. mailto

Computer Science & Information Technology

The chief rival to Intel in the PC chip market is AMD.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You can enter a(n) _________ in the Name box to select a range in the worksheet. A. range formula B. range data C. range reference D. range function

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology