Question: Rootkits can be difficult to discover because: a. They subvert the operating system b. They install themselves in master boot records (MBRs) c. They install
Rootkits can be difficult to discover because: a. They subvert the operating system b. They install themselves in master boot records (MBRs) c. They install themselves in flash memory d. They use hidden processes
8. The purpose of a bot army is: a. To launch Denial of Service attacks b. To relay spam, host phishing sites, or launch Denial of Service attacks c. To remotely control zombie computers d. To build a massively parallel system
9. An IT manager is considering an anti-spam solution. Because one of the primary concerns is e-mail server performance, which solution can be eliminated from consideration? a. Appliance b. Outsourced
c. Server-based
d. Client-based
10. Web beacons are an effective site usage tracker because: a. They use hidden form variables b. Browsers cannot detect them c. Browsers do not block them d. They are encrypted
11. The most effective countermeasure for malware is: a. Rootkit detection b. Decreasing user privilege levels c. Anti-virus d. Firewalls
12. The primary purpose for decreasing user privilege levels is: a. To reduce support costs b. To limit the effects of malware c. To improve system performance d. All of the above
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
