Which rootkit intercepts system calls and modifies them as required?

a. Flea
b. T0rm
c. Adorn
d. LKM

ANS: C

Computer Science & Information Technology

You might also like to view...

An image that is saved as JPEG at any compression quality can be recovered to the original quality any time by re-saving it in another uncompressed file format such as Photoshop PSd

Indicate whether the statement is true or false

Computer Science & Information Technology

Who is responsible for guaranteeing the integrity and accuracy of the evidence gathered in criminal or civil court cases?

What will be an ideal response?

Computer Science & Information Technology