Multiple Choice
If the LRK5 rootkit is installed on a Linux computer, entering the Trojaned ____ command allows the attacker's processes to continue running, even though the Linux administrator thinks all processes were killed.
A) Killall
B) Get
C) target
D) Dir
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: What can a security tester using enumeration
Q2: The MBSA can check for user account
Q2: What is Samba used for?
Q4: _ is an interprocess communication mechanism that
Q5: SMB stands for _.
Q6: SELinux contains several features and modules that
Q7: NetBIOS over TCP/IP is called _ in
Q8: Complete instructions for MBSA are available from
Q9: MATCHING<br>Match each term with the correct statement
Q11: MATCHING<br>Match each term with the correct statement