During a routine configuration audit, a systems administrator determines that a former employee placed an executable on an application server. Once the system was isolated and diagnosed, it was determined that the executable was programmed to establish a connection to a malicious command and control server. Which of the following forms of malware is best described in the scenario?
A. Logic bomb
B. Rootkit
C. Back door
D. Ransomware
Answer: B. Rootkit
Computer Science & Information Technology
You might also like to view...
A user account on a single computer is called a local account
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following is the version of CSS that is currently under development?
A) CSS1 B) CSSP C) CSS2 D) CSS3
Computer Science & Information Technology