Which rootkit intercepts system calls and modifies them as required?
a. Flea
b. T0rm
c. Adorn
d. LKM
ANS: C
Computer Science & Information Technology
You might also like to view...
An image that is saved as JPEG at any compression quality can be recovered to the original quality any time by re-saving it in another uncompressed file format such as Photoshop PSd
Indicate whether the statement is true or false
Computer Science & Information Technology
Who is responsible for guaranteeing the integrity and accuracy of the evidence gathered in criminal or civil court cases?
What will be an ideal response?
Computer Science & Information Technology