This topic contains a solution. Click here to go to the answer

Author Question: Which type of program can hide itself from normal inspection and detection? A) Trojan horse B) ... (Read 32 times)

deesands

  • Hero Member
  • *****
  • Posts: 514
Which type of program can hide itself from normal inspection and detection?
 
  A) Trojan horse
  B) Stealth Trojan
  C) Spyware
  D) Rootkit

Question 2

Rootkits replace legitimate programs and are considered a deeper threat than a set of programs called Trojan horses.
 
  Indicate whether the statement is true or false.



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

yotaSR5

  • Sr. Member
  • ****
  • Posts: 331
Answer to Question 1

Answer: D

Answer to Question 2

Answer: FALSE




deesands

  • Member
  • Posts: 514
Reply 2 on: Jul 7, 2018
Thanks for the timely response, appreciate it


scikid

  • Member
  • Posts: 300
Reply 3 on: Yesterday
Excellent

 

Did you know?

Patients who cannot swallow may receive nutrition via a parenteral route—usually, a catheter is inserted through the chest into a large vein going into the heart.

Did you know?

About 3.2 billion people, nearly half the world population, are at risk for malaria. In 2015, there are about 214 million malaria cases and an estimated 438,000 malaria deaths.

Did you know?

Computer programs are available that crosscheck a new drug's possible trade name with all other trade names currently available. These programs detect dangerous similarities between names and alert the manufacturer of the drug.

Did you know?

It is believed that humans initially contracted crabs from gorillas about 3 million years ago from either sleeping in gorilla nests or eating the apes.

Did you know?

The first documented use of surgical anesthesia in the United States was in Connecticut in 1844.

For a complete list of videos, visit our video library