This is an example of which of the following?

Upon investigation, an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?

Upon investigation, an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?

A.
Trojan

B.
Virus

C.
Logic bomb

D.
Rootkit



Leave a Reply 0

Your email address will not be published. Required fields are marked *