A rootkit collects user IDs and passwords to other machines on a network, giving the hacker root or privileged access
Indicate whether the statement is true or false.
True—A rootkit is a collection of tools that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network.
Computer Science & Information Technology
You might also like to view...
PowerPoint presentations are saved with a _____ file extension.
A. .pptx B. .ppt C. .ptpx D. .ppxt
Computer Science & Information Technology
Value checks are performed for data that is:
A) continuous. B) discrete. C) cross-referenced. D) using a check digit. E) stored on a master file.
Computer Science & Information Technology