A _____ is used by attackers to execute files, access logs, monitor user activity, and change a computer’s configuration.

a. scareware
b. patch
c. rootkit
d. worm


c. rootkit
A rootkit is a set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system and even obscure the presence of the rootkit from legitimate system administrators. Attackers can use the rootkit to execute files, access logs, monitor user activity, and change the computer’s configuration.

Computer Science & Information Technology

You might also like to view...

To create a table, you click the Table button in the:

A) Styles group on the Insert tab. B) Tables group on the Slide Layout tab. C) Styles group on the Slide Layout tab. D) Tables group on the Insert tab.

Computer Science & Information Technology

When showing changes, which of the following is NOT displayed in a Screen Tip?

A) Your name B) Date of change C) Your initials D) Time of change

Computer Science & Information Technology

A noncritical task is one that can ____ without affecting the project Finish date.

A. space B. effort C. slip D. duration

Computer Science & Information Technology

Small, diamond-shaped characters appear on the border of a picture when it is selected

Indicate whether the statement is true or false

Computer Science & Information Technology