FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
It alters the behaviors’ of APIs (application programming interfaces), which is another name for application rootkit, and replaces executable files and system libraries.
A
USER-MODE
B
WORMS
C
BOOTKIT
D
KERNEL MODE
Explanation: 

Detailed explanation-1: -Also known as an “application rootkit, ” the user-mode rootkit replaces executables and system libraries and modifies the behavior of application programming interfaces (APIs).

Detailed explanation-2: -Application rootkits replace standard files in your computer with rootkit files and may even change the way standard applications work. These rootkits infect programs like Microsoft Office, Notepad, or Paint. Attackers can obtain access to your computer every time you run those programs.

Detailed explanation-3: -Kernel-mode rootkits can be even more powerful since, not only can they intercept the native API in kernel-mode, but they can also directly manipulate kernel-mode data structures.

Detailed explanation-4: -Root refers to the Admin account on Unix and Linux systems, and kit refers to the software components that implement the tool. Today rootkits are generally associated with malware – such as Trojans, worms, viruses – that conceal their existence and actions from users and other system processes.

There is 1 question to complete.