FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Software that reaches protected parts of an operating system and can often remain hidden, allowing remote administrator access, are called ____
A
Phishing software
B
Viruses
C
Backdoors
D
Rootkits
Explanation: 

Detailed explanation-1: -Rootkit Detection Detection methods include behavioral-based methods (e.g., looking for strange behavior on a computer system), signature scanning and memory dump analysis. Often, the only option to remove a rootkit is to completely rebuild the compromised system.

Detailed explanation-2: -Keyloggers can embed themselves into the operating system of your computer. These types of malware are called “rootkit” viruses. There are types of keyloggers that can even work at a lower level than the operating system.

Detailed explanation-3: -A rootkit is a type of malware designed to give hackers access to and control over a target device. Although most rootkits affect the software and the operating system, some can also infect your computer’s hardware and firmware.

Detailed explanation-4: -Rootkits hide by using some of the lower layers of the operating system, including API function redirection or undocumented OS functions, which makes them almost undetectable by common anti-malware software.

There is 1 question to complete.