An exploit that leaves an attacker with another way to compromise a network later is called which of the following? (Choose all that apply.)

a. Rootkit
b. Worm
c. Backroot
d. Backdoor

Answer:
a. Rootkit
d. Backdoor

Computer Science & Information Technology

You might also like to view...

Using data collected at register terminals to determine consumer buying patterns is an example of ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is a method in the java.util.List interface?

a) addBefore b) addAfter c) add d) shift e) resize

Computer Science & Information Technology