Multiple Choice
Rootkits are
A) Software used to hide the existence of malicious software on computer systems
B) Exploits that compromise a previously unknown software vulnerability
C) Computers that perform malicious tasks at the direction of a remote controller
D) Manipulating people into performing desired actions
Correct Answer:

Verified
Correct Answer:
Verified
Q8: The NVD database<br>A) Describes likely impacts and
Q9: A cross-site scripting vulnerability can occur when<br>A)
Q10: Physical controls<br>A) Use non-technical methods of preventing
Q11: Threats are<br>A) Safeguards used to minimize the
Q12: Controls are<br>A) Safeguards used to minimize the
Q14: Zero-day exploits are<br>A) Software used to hide
Q15: As reported in the chapter, recent trends
Q16: Vulnerabilities are<br>A) Safeguards used to minimize the
Q17: A lack of input validation vulnerability refers
Q18: Phishing refers to<br>A) Programs that propagate through