Upon investigation, an administrator finds a suspicious system-level kernel module which modifies
file system operations. This is an example of which of the following?
A.
Trojan
B.
Virus
C.
Logic bomb
D.
Rootkit
Explanation:
Upon investigation, an administrator finds a suspicious system-level kernel module which modifies
file system operations. This is an example of which of the following?
Upon investigation, an administrator finds a suspicious system-level kernel module which modifies
file system operations. This is an example of which of the following?
A.
Trojan
B.
Virus
C.
Logic bomb
D.
Rootkit
Explanation: