Any code that is designed to hide the existence of processes and privileges is referred to as a(n) _______.
Fill in the blank(s) with the appropriate word(s).
rootkit
Computer Science & Information Technology
You might also like to view...
A battery pack is more than one battery charger
Indicate whether the statement is true or false
Computer Science & Information Technology
_____________________ provides a trend analysis of your computer's system stability over time
a. Event Viewer b. Reliability Monitor c. Resource Monitor d. Performance Monitor
Computer Science & Information Technology