A ____ is created after an attack and usually hides itself within the OS tools, so it's almost impossible to detect.
A) toolbox
B) rootkit
C) shell
D) macro virus
Correct Answer:
Verified
Q10: The virus signature file is maintained by
Q11: One of the most insidious attacks against
Q12: A _ can replicate itself, usually through
Q13: Computer crime is the fastest growing type
Q14: _ is a remote control program.
A)Slammer
B)BlackIce
C)Symantec pcAnywhere
D)Zone
Q16: The average home user or small-business owner
Q17: Macro viruses are hard to create.
Q18: A _ attack prevents legitimate users from
Q19: To represent 0 to 63 characters you
Q20: _ commands that open and close files
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents