1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
In-s [12.5K]
4 years ago
6

A ____ rootkit is one that becomes a part of the system bootstrap process and is loaded every time the system boots. Select one:

a. user-mode b. memory-based c. kernel-mode d. persistent
Computers and Technology
1 answer:
Dmitriy789 [7]4 years ago
6 0

Answer: d) Persistent rootkit

Explanation:

Persistent rootkit is the rootkit device that performs the constant function of getting loaded at every moment when the computer system gets started.This function is automatically executed .

  • Other options are incorrect because user-mode rootkit,kernel mode rootkit and memory-orientated rootkit are not devices that gets activated every time the computing system gets booted -up.
  • Thus, the correct option is option(d).
You might be interested in
What makes Group Policy such a powerful tool is its ability to enable security administrators to:_________.
babunello [35]

Answer: Enforce the organization's security policy

Explanation: Group policy provides a robust and centralized control to systems or computers on a particular network by providing a quick and efficient means of maintaining network security by affording network administrators the ability to several policies they wish to apply on users and computers in their network. This way the changes or policies can be applied to every computer on it's network. Hence it allows the network administrators to enforce the organization's security policy which may include restricting access to certain websites, directories, files or settings for all computers on the organization's network.

5 0
3 years ago
Dave has to create animations for a game. Which tool can Dave use?
vodka [1.7K]

A is your answer

Adobe Flash and Adobe Premier are sited that can help your computer allow games, photos, documents, etc. on your computer so you can view them. Sony Media Sound Forge is for listening to things, it has the word Sound in the title. 3D Studio Max is a website where you can create illustrations

7 0
3 years ago
Read 2 more answers
In a case where electrical current leakage from the circuit occurs, the GFCI would do the following:
tigry1 [53]

Answer:

In a case where electrical current leakage from the circuit occurs, the GFCI would do the following:

1. Sense the current leakage.

2. Trip the circuit.​

3. Cut off the electricity.

Electrical current leakage needs to be sensed at once. Without it being detected, it cant be dealt with. The second step consists of tripping the  circuit so at to remove the flow of electricity. The third step is to Cut the electricity off so to stop the leakage and be safe.

I hope the answer is helpful.

Thanks.

4 0
3 years ago
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
Kay [80]

Answer:

magnitude and the probability of it occurring

Explanation:

In every single study that involves an individuals risk of self-harm there are two variables that need to be evaluated, and those are the magnitude and the probability of it occurring. In other words how likely is the individual to hurt themselves and if they do, to what extent (physical, emotional, death). By evaluating this can allow you to take action if things get to serious, or even prevent something from happening that can lead that person that is at risk from hurting themselves.

4 0
3 years ago
Convert (675.6)8 to hexadecimal. (use base 2 instead of base 10 as the intermediate base for conversion).
Rufina [12.5K]

Answer:

1BD.C

Explanation:

Keep in mind that octal number has 3 binary fields where the right field is the number 1, the center field is the number 2 and the left field is the number 4. you need that your 3 fields sum the final octal digit.

For example :

  • (1)8 = (001)2
  • (2)8 = (010)2
  • (3)8 = (011)2

The hexadecimal number has 4 binary fields where the right field is the number 1, the center field is the number 2 , the next center field is the number 4 and the left field is the number 8. you need that your 4 fields sum the final hexadecimal digit.

For example:

  • (F)16 = (1111)2
  • (1)16 = (0001)2
  • (6)16 = (0110)2

Step 1: Split your octal number  in digits and convert to binary form

         6                             7                           5               .                  6

        110                          111                         101              .                110

Step 2: Join your binary number and split in groups of 4 elements from the point (Important note: If you miss some element to complete the groups at the left of the point complete with zero's at the left, else if you miss some element to complete the groups at the right of the point complete with zero's at the right)

binary complete:      110111101.110

binary in groups of 4:

                     1                1011                      1101            .                110

Complete the groups with zero's (Remember the important note):

               0001                1011                      1101            .              1100

Step 3: Calculate the hexadecimal number

                  1                      B                         D               .               C

     

4 0
3 years ago
Other questions:
  • An effective password can help prevent
    11·2 answers
  • I need some cool things to do with windows command prompt.
    13·1 answer
  • Successful implementation of an effective MRP system depends upon (1) the recognition of the difference between independent and
    13·1 answer
  • Cash cows are always in
    7·1 answer
  • If you were writing a story set in our time, what would you include to give readers a sense of our world? Check any that apply.
    5·1 answer
  • Find different between manocots and dicots clarify with example​
    14·1 answer
  • As the first step, load the dataset from airline-safety.csv by defining the load_data function below. Have this function return
    9·1 answer
  • Most project files will contain:
    9·1 answer
  • Jabari created new video game for his coding course. What is one way he should format his pseudocode?
    12·1 answer
  • What is the purpose of a computer network needs assessment? to evaluate how to move from the current status to the desired goal
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!