A _________ is a set of programs installed on a system to maintain covert access to that system with administrator (root) privileges while hiding evidence of its presence.

Fill in the blank(s) with the appropriate word(s).

rootkit

Computer Science & Information Technology

You might also like to view...

Affective computing is a field of study focused on the managing, processing, and automatic retrieval of information

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following terms is commonly used to describe a VLAN configuration in which one router connects to a switch that supports multiple VLANs?

a. router-on-a-stick b. branched router c. router overloading d. router-on-a-branch

Computer Science & Information Technology