A _________ is a set of programs installed on a system to maintain covert access to that system with administrator (root) privileges while hiding evidence of its presence.
Fill in the blank(s) with the appropriate word(s).
rootkit
Computer Science & Information Technology
You might also like to view...
Affective computing is a field of study focused on the managing, processing, and automatic retrieval of information
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following terms is commonly used to describe a VLAN configuration in which one router connects to a switch that supports multiple VLANs?
a. router-on-a-stick b. branched router c. router overloading d. router-on-a-branch
Computer Science & Information Technology