Question: Rootkits can be difficult to discover because: a. They subvert the operating system b. They install themselves in master boot records (MBRs) c. They install

Rootkits can be difficult to discover because: a. They subvert the operating system b. They install themselves in master boot records (MBRs) c. They install themselves in flash memory d. They use hidden processes

8. The purpose of a bot army is: a. To launch Denial of Service attacks b. To relay spam, host phishing sites, or launch Denial of Service attacks c. To remotely control zombie computers d. To build a massively parallel system

9. An IT manager is considering an anti-spam solution. Because one of the primary concerns is e-mail server performance, which solution can be eliminated from consideration? a. Appliance b. Outsourced

c. Server-based

d. Client-based

10. Web beacons are an effective site usage tracker because: a. They use hidden form variables b. Browsers cannot detect them c. Browsers do not block them d. They are encrypted

11. The most effective countermeasure for malware is: a. Rootkit detection b. Decreasing user privilege levels c. Anti-virus d. Firewalls

12. The primary purpose for decreasing user privilege levels is: a. To reduce support costs b. To limit the effects of malware c. To improve system performance d. All of the above

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!