This topic contains a solution. Click here to go to the answer

Author Question: Which type of program can hide itself from normal inspection and detection? A) Trojan horse B) ... (Read 85 times)

deesands

  • Hero Member
  • *****
  • Posts: 514
Which type of program can hide itself from normal inspection and detection?
 
  A) Trojan horse
  B) Stealth Trojan
  C) Spyware
  D) Rootkit

Question 2

Rootkits replace legitimate programs and are considered a deeper threat than a set of programs called Trojan horses.
 
  Indicate whether the statement is true or false.



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

yotaSR5

  • Sr. Member
  • ****
  • Posts: 331
Answer to Question 1

Answer: D

Answer to Question 2

Answer: FALSE




deesands

  • Member
  • Posts: 514
Reply 2 on: Jul 7, 2018
Great answer, keep it coming :)


Liddy

  • Member
  • Posts: 342
Reply 3 on: Yesterday
Wow, this really help

 

Did you know?

It is believed that the Incas used anesthesia. Evidence supports the theory that shamans chewed cocoa leaves and drilled holes into the heads of patients (letting evil spirits escape), spitting into the wounds they made. The mixture of cocaine, saliva, and resin numbed the site enough to allow hours of drilling.

Did you know?

A strange skin disease referred to as Morgellons has occurred in the southern United States and in California. Symptoms include slowly healing sores, joint pain, persistent fatigue, and a sensation of things crawling through the skin. Another symptom is strange-looking, threadlike extrusions coming out of the skin.

Did you know?

Excessive alcohol use costs the country approximately $235 billion every year.

Did you know?

Thyroid conditions cause a higher risk of fibromyalgia and chronic fatigue syndrome.

Did you know?

Computer programs are available that crosscheck a new drug's possible trade name with all other trade names currently available. These programs detect dangerous similarities between names and alert the manufacturer of the drug.

For a complete list of videos, visit our video library