1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GrogVix [38]
3 years ago
15

Malware that corrupts the target operating system in such a manner that a network defender can no longer trust the native OS is

exhibiting what type of characteristics?
worm

trojan

rootkit

exploit
Computers and Technology
1 answer:
qaws [65]3 years ago
8 0

Answer: Rootkit

Explanation: Rootkit is the software that helps in carrying out malicious attack by giving the permission to unauthorized user for accessing the system. This software comes with numerous tools for attacking the restricted and confidential information and resources of the system such as password stealers, key-loggers , antivirus disabling tool etc.

Network defender can lose trust when rootkit software gets into the operating system because it gives complete control for privileged accessing the system to the attacker .The detection and elimination of rootkit is also a difficult task.

Other options are incorrect because worm is malware that copies and spreads from one computer system to other. Trojan provides the unauthorized access of attacker in the system and can infect system but cannot be highly harmful as rootkit. Exploit is a code that enters the system to provide access to cyber-criminals but it can be detected .

Thus ,the correct option is rootkit.

You might be interested in
How many bit strings of length 12 contain the substring 111000?
ELEN [110]

Answer:

448 strings

Explanation:

Each bit string can be filled by two ways either 0 or 1. If the bit strings of length contain the substring '111000' we therefore need a substring of length 6.

The selection of bits starts from the 1st bit to 7th bit enclosing the substring 111000 and ensuring that the length 6 are all filled. So, there will be  7 ways to contain this substring.

The total ways to contain this substring = 7*2^6 =448

Therefore 448 strings of length 12 contain the substring '111000'.

7 0
3 years ago
How can you get a fraction bar on a calculatar?
ArbitrLikvidat [17]
Convert a fraction to a decimal value using the fraction to decimal calculator by entering your fraction below. Use the “/” symbol for the fraction bar. To convert a decimal to a fraction, use our decimal to fraction calculator. Check out our fraction to percent calculator to convert fractions to a percentage.
6 0
3 years ago
What is hypertext? Whata search engine? What is IT?
Verizon [17]

Answer:

Hypertext is a text in a document which references some other link within the same page or another page.

Search engine is an information retrieval system from larger pool of resources.

IT is for information technology whereby with the help of systems and communication medium we are able to send, retrieve information from one place to another.

Explanation:

Some website page can contain hypertext which is a link to another page. These are simple text upon clicking it lands us to another page or a pop up activity.

Examples of search engine is google with which we can search and retrieve information from a large database servers.

IT governs the ways these information exchanges taking place between client and sender with help of systems(computers) and communicating medium(internet).

7 0
3 years ago
Read 2 more answers
Write a function named remove_duplicates that takes a list (of numeric and/or string values) and returns a new list with only th
Lorico [155]

Answer:

def remove_duplicates(lst):

   no_duplicate = []

   dup = []

   for x in lst:

       if x not in no_duplicate:

           no_duplicate.append(x)

       else:

           dup.append(x)

   for y in dup:

       if y in no_duplicate:

           no_duplicate.remove(y)

   return no_duplicate

Explanation:

Create a function called remove_duplicates that takes one parameter, lst

Create two lists one for no duplicate elements and one for duplicate elements

Create for loop that iterates through the lst. If an element is reached for first time, put it to the no_duplicate. If it is reached more than once, put it to the dup.

When the first loop is done, create another for loop that iterates through the dup. If one element in no_duplicate is in the dup, that means it is a duplicate, remove that element from the no_duplicate.

When the second loop is done, return the no_duplicate

6 0
3 years ago
To serve as a visual reminder that the structure or class name is not a variable, structure names and class names should _______
GrogVix [38]
<span>be clearly marked as distinct from variables. Instead, they should be marked or labeled otherwise, and an explicit indication that they are not variables should be provided both next to the structure and class names, and also on a separate visual material.</span>
7 0
4 years ago
Other questions:
  • Write a function named get_my_age that returns your age as an int (this is YOUR age, so if you were 21 you would return the numb
    11·1 answer
  • Describe any four rights of users of information systems.
    8·1 answer
  • What is the main purpose of cutting plane line arrows?
    7·1 answer
  • Which of the following technologies is the best choice to convey urgent and highly sensitive information?a. Telephone b. Fax Let
    12·1 answer
  • Based on the condition.
    13·1 answer
  • NAT ________. allows a firm to have more internal IP addresses provides some security both allows a firm to have more internal I
    5·1 answer
  • A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection co
    9·1 answer
  • Select all the items of the Design Elements.
    7·1 answer
  • Answer the questions about PowerPoint using the drop-down menus,
    15·2 answers
  • What is one way object-oriented programming differs from procedural programming?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!