An exploit that leaves an attacker with another way to compromise a network later is called which of the following? (Choose all that apply.)
a. Rootkit
b. Worm
c. Backroot
d. Backdoor
Answer:
a. Rootkit
d. Backdoor
Computer Science & Information Technology
You might also like to view...
Using data collected at register terminals to determine consumer buying patterns is an example of ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which of the following is a method in the java.util.List interface?
a) addBefore b) addAfter c) add d) shift e) resize
Computer Science & Information Technology