Igarvin33231 Igarvin33231
  • 29-08-2019
  • Computers and Technology
contestada

_______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.

Respuesta :

ExieFansler ExieFansler
  • 04-09-2019

Answer:

Rootkit.

Explanation:

Rootkit is a collection of software tools,mostly malicious.These are mostly used by hackers to obtain administrator permission to a computer by masking intrusion.

Root-kit is made from two word Root and kit.Where root refers to the name of privileged account on an operating system that is somewhat like unix and KIT refers to the tools used.

Answer Link

Otras preguntas

According to the most recent study, __________ married u.s. couples who have separated get back together.
3^x ( x^2 -3) i don't know how to solve this problem
What is the solution set? ​ −8x−18<−42 ​
The scientific study of the origins, symptoms, and development of mental, emotional, and behavioral disorders, and the disorders themselves, are called
A sofa is on sale for $283.80, which is 67% less than the regular price. What is the regular price?
Provide an argument against the colonization of the Americas by the Europeans.
Helpppppp please please
Sand Key is a barrier island located along the coast of Florida. Which process most likely caused Sand Key to form? sudden erosion of a sandbar deposition of
What s a typical response to stress for someone with a type A personality? A. Hostility B. Patience C. Avoidance D. Lack of accomplishment
PLZ TELL ME THIS!! IF I DONT GET AN A THEY WILL KICK ME OUT!! Which describes the common goal of the 14th Amendment and the Civil Rights Act of 1866? A. pun