Which malware attempts to embed itself deeply into a system in order to hide itself and other items, such as files, folders, or even executable processes?
A. Rootkit
B. Trojan horse
C. Worm
D. Virus
Answer: A. Rootkit
Computer Science & Information Technology
You might also like to view...
When arguments are passed by __________, the caller allows the called function to modify the original variable’s value.
a) value b) reference c) both a and b (d) none of these
Computer Science & Information Technology
What sorting algorithm is implemented by the following function?
void sort(int arr[]) { int n = arr.length; for (int i = 0; i < n-1; i++) { int min_idx = i; for (int j = i+1; j < n; j++) if (arr[j] < arr[min_idx]) min_idx = j; int temp = arr[min_idx]; arr[min_idx] = arr[i]; arr[i] = temp; } } a. Selection sort. b. Bubble Sort. c. Quick sort. d. Merge Sort.
Computer Science & Information Technology