10. Ben's system was infected by malicious code that modified the operating system to allow the malicious code author to gain access to his files. What type of exploit did this attacker engage in?
(A) Escalation of privilege
(B) Backdoor
(C) Rootkit
(D) Buffer overflow
答案:登入後查看
統計: A(0), B(0), C(1), D(0), E(0) #3560399
統計: A(0), B(0), C(1), D(0), E(0) #3560399