During a routine configuration audit, a systems administrator determines that a former employee placed an executable on an application server. Once the system was isolated and diagnosed, it was determined that the executable was programmed to establish a connection to a malicious command and control server. Which of the following forms of malware is best described in the scenario?

A. Logic bomb
B. Rootkit
C. Back door
D. Ransomware

Answer: B. Rootkit

Computer Science & Information Technology

You might also like to view...

A user account on a single computer is called a local account

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is the version of CSS that is currently under development?

A) CSS1 B) CSSP C) CSS2 D) CSS3

Computer Science & Information Technology