Which popular rootkit breaks netstat and ps binary in 31336 bytes?
a. Flea
b. T0rm
c. Adorn
d. LKM
ANS: B
Computer Science & Information Technology
You might also like to view...
Which of the following ports should be open if a server is configured as an email server with high security for incoming connections? (Choose two.)
A. TCP 110 B. TCP 143 C. TCP 161 D. TCP 993 E. TCP 995
Computer Science & Information Technology
The ____ specifier provides an intermediate level of access, between public and private.
A. protected B. static C. abstract D. strict
Computer Science & Information Technology