Which of the following methods of malware delivery is used in computer programs to bypass normal authentication?

A. Privilege escalation
B. Active interception
C. Backdoor
D. Rootkit

C. Backdoors bypass normal authentication. They are used by attackers to make changes to network devices, websites, or other programs. Privilege escalation is the act of exploiting a bug or design flaw in software. Active interception is the capturing of information by a computer placed between the sender and the receiver. A rootkit is software designed to gain administrator-level control over a computer system without being detected.

Computer Science & Information Technology

You might also like to view...

Fields must be next to each other to be included in a sort within a query.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When you overload an operator, you cannot change the number of __________ taken by the operator.

a. arguments b. parameters c. operations d. operands e. None of these

Computer Science & Information Technology