Any code that is designed to hide the existence of processes and privileges is referred to as a(n) _______.

Fill in the blank(s) with the appropriate word(s).

rootkit

Computer Science & Information Technology

You might also like to view...

A battery pack is more than one battery charger

Indicate whether the statement is true or false

Computer Science & Information Technology

_____________________ provides a trend analysis of your computer's system stability over time

a. Event Viewer b. Reliability Monitor c. Resource Monitor d. Performance Monitor

Computer Science & Information Technology