Disclaimer for ReGyan
If you require any more information or you have any problem regarding Copyright or have any questions about our site’s disclaimer, please feel free to contact us by email at hello@regyan.com.
Disclaimers for ReGyan
All the information on this website is published in good faith and for general information and educational purpose only. ReGyan does not make any warranties about the completeness, reliability, and accuracy of this information. Any action you take upon the information you find on this website (regyan.com), is strictly at your own risk. will not be liable for any losses and/or damages in connection with the use of our website.
Computer System Security 6th Week Solution is given below.
Also See:- Computer System Security 7th Week Solution
Also See:- NLC Recruitment 2020 Apply Online 330 Assistant Manager
[1]Which of the following is the best possible name for backdoor virus?
- (a) stealth
- (b) Hidden key
- (c) Rootkit
- (d) Worm
Answer(c) Rootkit
[2] Once root access has been enabled, a rootkit may attempt to –
Answer:- All of the above
[3] Binary rootkits and library rootkits are the examples of –