Which of the following is created after an attack and usually hides within the OS tools, so it is almost impossible to detect?

A. toolbox
B. rootkit
C. shell
D. macro virus

Answer: B

Computer Science & Information Technology

You might also like to view...

Spam sent by scammers often uses spoofed email addresses.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A possible use for the Index method includes determining whether the area code "(312)"  appears in a phone number.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology