Arriving on the scene of a potential crime, you are asked to examine a computer. Before taking it down for transport you decide to do a live memory analysis. In the process you discover that a particularly malevolent piece of malware has been installed that will irreparably damage the file system if anyone but the original user logs on. What is the proper name for such a program?

a. Virus
b. Worm
c. Trojan horse
d. Rootkit

d.

Computer Science & Information Technology

You might also like to view...

Which of the following statements about separating a class’s interface and implementation is not true?

a. Inline member function definitions are included in the header file. b. Changes in the class’s interface will affect the client. c. Private data members are included in the header file. d. Changes in the class’s implementation will affect the client.

Computer Science & Information Technology

The Windows 10 Firewall is which of the following types?

A) Packet filtering firewall B) Application gateway firewall C) Stateful packet inspection firewall D) Circuit gateway firewall

Computer Science & Information Technology