A technician suspects that a system has been compromised. The technician reviews the following log entry:WARNING- hash mismatch: C:\Window\SysWOW64\user32.dllWARNING- hash mismatch: C:\Window\SysWOW64\kernel32.dllBased solely ono the above information, which of the following types of malware is MOST likely installed on the system?

A. Rootkit
B. Ransomware
C. Trojan
D. Backdoor

Answer: A. Rootkit

Computer Science & Information Technology

You might also like to view...

________ is a way to market yourself by developing your image, personal style, abilities, and other characteristics to separate yourself from others

Fill in the blank(s) with correct word

Computer Science & Information Technology

Tom is tuning his security monitoring tools in an attempt to reduce the number of alerts received by administrators without missing important security events. He decides to configure the system to only report failed login attempts if there are five failed attempts to access the same account within a one-hour period of time. What term best describes the technique that Tom is using?

A. Thresholding B. Sampling C. Account lockout D. Clipping

Computer Science & Information Technology