A _____ is used by attackers to execute files, access logs, monitor user activity, and change a computer’s configuration.
a. scareware
b. patch
c. rootkit
d. worm
c. rootkit
A rootkit is a set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system and even obscure the presence of the rootkit from legitimate system administrators. Attackers can use the rootkit to execute files, access logs, monitor user activity, and change the computer’s configuration.
You might also like to view...
To create a table, you click the Table button in the:
A) Styles group on the Insert tab. B) Tables group on the Slide Layout tab. C) Styles group on the Slide Layout tab. D) Tables group on the Insert tab.
When showing changes, which of the following is NOT displayed in a Screen Tip?
A) Your name B) Date of change C) Your initials D) Time of change
A noncritical task is one that can ____ without affecting the project Finish date.
A. space B. effort C. slip D. duration
Small, diamond-shaped characters appear on the border of a picture when it is selected
Indicate whether the statement is true or false