1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GrogVix [38]
3 years ago
15

Malware that corrupts the target operating system in such a manner that a network defender can no longer trust the native OS is

exhibiting what type of characteristics?
worm

trojan

rootkit

exploit
Computers and Technology
1 answer:
qaws [65]3 years ago
8 0

Answer: Rootkit

Explanation: Rootkit is the software that helps in carrying out malicious attack by giving the permission to unauthorized user for accessing the system. This software comes with numerous tools for attacking the restricted and confidential information and resources of the system such as password stealers, key-loggers , antivirus disabling tool etc.

Network defender can lose trust when rootkit software gets into the operating system because it gives complete control for privileged accessing the system to the attacker .The detection and elimination of rootkit is also a difficult task.

Other options are incorrect because worm is malware that copies and spreads from one computer system to other. Trojan provides the unauthorized access of attacker in the system and can infect system but cannot be highly harmful as rootkit. Exploit is a code that enters the system to provide access to cyber-criminals but it can be detected .

Thus ,the correct option is rootkit.

You might be interested in
Which type of profile allows a user within a corporation to use the same user profie regardless of the computer that user is usi
zzz [600]

Answer: c)Roaming user profiles

Explanation:Roaming user profiles are those profiles that creates the copy from the local profile and get stored in the network server. Roaming user profiles haves the function of getting logged in any computer system that the user is processing by getting downloaded.

It has the advantage of not creating profiles on every computer system that user wants to login .Thus, the correct answer is option(c) because other profiles mentioned in the option cannot copy the profile in the server and so do not have capability to be accessed in other computer system.

8 0
3 years ago
Common icons found on the Windows desktop are _____.
Ket [755]

Answers- My computer, My Documents and Recyle bin.

2,3,4 option

5 0
3 years ago
Read 2 more answers
Cómo se hacían antes las cosas que hoy en día se hacen apoyadas en aplicaciones y software?
KatRina [158]

Answer:

Las cosas que hoy en día se hacen apoyadas en aplicaciones y el software se hacían de manera manual, artesanal o empírica, es decir, antes del avenimiento de la era digital, las tareas que hoy se han automatizado o informatizado se realizaban de forma analógica, mediante procesos con una participación humana mucho más fuerte.

Así, por ejemplo, en el entrenamiento, la medición de variables por parte de los entrenadores respecto de los atletas era procesada de forma manual: la comparación de las distintas estadísticas era recopilada en formato físico, y analizada en forma personal por profesionales idóneos para tal tarea, mientras que hoy en día esa tarea se ha automatizado y es llevada a cabo por programas informáticos específicos.

A su vez, respecto de la tecnología, por ejemplo, el análisis de las variables de mercado y la subida o bajada de distintos valores era sistemáticamente analizada en forma manual, mientras hoy en día diversos programas permiten realizar un análisis técnico y financiero en forma digital.

6 0
3 years ago
Answer the questions given below, share your ideas.Use the space for your answer.
Bess [88]

Answer:

I would get rid of the machine and well

8 0
2 years ago
List the various cases where use of a NULL value would be appropriate.
melomori [17]

Answer:

The answer is below

Explanation:

There are cases where the use of a NULL value would be appropriate in a computer programming situation. These cases can be summarily described below:

The first case is in a situation where the value of the attribute of a certain element is known to exist, but the value can not be found

The second case is in a situation where the value of the attribute of a certain element is not known whether it exists or not.

4 0
3 years ago
Other questions:
  • . Reorder the following efficiencies from smallest to largest:
    9·1 answer
  • Henry must choose which type of smart speaker to use in his home. He asked you to help him decide which one will best suit his n
    11·1 answer
  • (PYTHON HOMEWORK)Given the following code snippet, which statement tests to see if all three sets are equal?:
    11·1 answer
  • Pls help
    15·2 answers
  • Who plays xbox one offline and knows some multiplayer games that can be played offline.
    15·2 answers
  • A major public university graduates approximately 10,000 students per year, and its development office has decided to build a We
    10·1 answer
  • 1. What does a computer
    7·2 answers
  • Which is the correct notation to specify the following inheritance?
    8·1 answer
  • Write at least and explain four types of escape sequences and create an example in an IDE which consist of the mentioned escape
    7·1 answer
  • 1. Fill in the blanks:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!