Which popular rootkit breaks netstat and ps binary in 31336 bytes?

a. Flea
b. T0rm
c. Adorn
d. LKM

ANS: B

Computer Science & Information Technology

You might also like to view...

Which of the following ports should be open if a server is configured as an email server with high security for incoming connections? (Choose two.)

A. TCP 110 B. TCP 143 C. TCP 161 D. TCP 993 E. TCP 995

Computer Science & Information Technology

The ____ specifier provides an intermediate level of access, between public and private.

A. protected B. static C. abstract D. strict

Computer Science & Information Technology