Igarvin33231 Igarvin33231
  • 29-08-2019
  • Computers and Technology
contestada

_______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.

Respuesta :

ExieFansler ExieFansler
  • 04-09-2019

Answer:

Rootkit.

Explanation:

Rootkit is a collection of software tools,mostly malicious.These are mostly used by hackers to obtain administrator permission to a computer by masking intrusion.

Root-kit is made from two word Root and kit.Where root refers to the name of privileged account on an operating system that is somewhat like unix and KIT refers to the tools used.

Answer Link

Otras preguntas

Nomads move from place to place looking for ______
Carl's bead order includes 3 boxes of 100 beads. Which could be the number of beads in Carl's order?
Convert 0.0075 to a percent
What is the net ionic equation of the reaction of mgso4 with sr(no3)2? express you answer as a chemical equation including phases?
What types of problems did European colonists face?
Calculate the theoretical atom economy for each reaction. a. 2 cuo (s) + c (s) → 2 cu (s) + co2 (g)
If the amount of flour were increased by a factor of 2 1/2, in cups, how much flour would there be? 2/3 is the originonal fraction for w suger 1. 2 1/2 2. 2 1
which of the following will protect against floodingflood sirens dams water treatment facilities fences
What two things would eventually hurt the southern cause during the civil war
What is the name given to the voyage of slaves from africa to america?