1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Grace [21]
3 years ago
8

True or False Rootkits are only made by black-hat hackers.

Computers and Technology
1 answer:
Kipish [7]3 years ago
4 0
True rookies are only made by black hat hackers I am not sure I hope this will help
You might be interested in
Ipv6 includes a native information security framework (ipsec) that provides both data and control packets. true false
Galina-37 [17]
<span>The statement that IPv6 includes a native information security framework (IPsec) that provides both data and control packets is false.
</span>IPSec is a mandatory component for IPv6, and is used to natively protect IPv6 data <span>as it is sent over the network,. and not control packets.
</span>The IPv6 IPSec is a set of Internet standards that uses cryptographic security services to provide confidentiality ,data origin authentication and data integrity<span>
</span>

5 0
3 years ago
WILL MARK BRAIN LIST!
Maslowich
I think it’s a

if it isn’t a then it’s d
6 0
3 years ago
Read 2 more answers
Flash drives cds external disks are all examples of storage (memory) devices
abruzzese [7]
True; you can store anything up to operating systems on them. Come in handy when transferring data from computer to computer.
8 0
3 years ago
The best defense against injection attacks is to
Sergeeva-Olga [200]
The best defense against injection attacks is to develop secure habits and adopt policies and procedures that minimize vulnerabilities. Staying aware of the types of attacks you're vulnerable to because of your programming languages, operating systems and database management systems is critical.
5 0
2 years ago
You wish to use a file system that creates a record or log of to-be-committed changes in the system so that if the system crashe
Dmitry [639]

Answer:

Journaling file system

Explanation:

A "file system" allows the control of data storage and retrieval.

The "Journaling file system" is a type of file system that records the<u> to-be committed changes in the computer.</u> This can track both of the <em>data stored</em> and the <em>related metadata</em>. This kind of data structure is then referred to as a "journal." So, this means that if the system crashes or a power failure happens, <u>there is a lesser chance for the file system to be corrupted</u>. It can also recover <em>gracefully or even more quickly.</em>

So, this explains the answer.

5 0
4 years ago
Other questions:
  • If you use a surrogate key, you must ensure that the candidate key of the entity in question performs properly through the use o
    5·1 answer
  • Declare a character variable letterStart. Write a statement to read a letter from the user into letterStart, followed by stateme
    12·1 answer
  • Direct connections provide continuous access to the Internet. Many bandwidth options are associated with direct connections. Whi
    9·1 answer
  • Print a countdown from n to 1 The function below takes one parameter: an integer (begin). Complete the function so that it print
    8·1 answer
  • Web crawlers or spiders collect information from Web pages in an automated or semi-automated way. Only the text of Web pages is
    10·1 answer
  • Name two different ways you can bring up the my computer folder
    9·2 answers
  • What are the things that a computer literate understands?Name thems.​
    14·1 answer
  • Does anyone have 2.19.4 Guess a number 2.0 code for codehs?
    8·1 answer
  • Your connection to this site is not secure how to fix.
    15·1 answer
  • 1. A _______ causes the computer program to behave in an incorrect or unexpected way.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!