Which of the following are the computer programs that are designed by attackers to gain root or administrative access to your computer?
A. Antiware
B. Rootkits
C. Backdoors
D. Malware
Answer: Option B
Solution (By Examveda Team)
The correct answer is B: Rootkits.Let's break down why:
A: Antiware - This isn't a real term in computer security. It sounds like it might be the opposite of malware, but it's not a standard term.
B: Rootkits - This is the correct answer. A rootkit is a set of software tools designed to conceal its presence and the presence of other malware on a computer system. Crucially, it allows an attacker to gain "root" or administrative access, meaning they can control the computer as if they were the owner.
C: Backdoors - A backdoor is a secret way to access a system, bypassing normal security measures. While malware can *use* backdoors, backdoors themselves aren't necessarily *designed* to gain root access; they simply provide a shortcut. Rootkits are more directly aimed at gaining full control.
D: Malware - Malware is a broad term for any malicious software, including viruses, worms, Trojans, etc. While rootkits *are* a type of malware, the question specifically asks about programs designed to gain root/administrative access. Rootkits are *specifically* designed for this purpose, whereas other types of malware might have different goals.
Therefore, Rootkits are the best answer because they are specifically designed to gain root or administrative access.
Join The Discussion
Comments (1)
Related Questions on Internet and Web Technology
Internet was started in India on:
A. 9th August, 1996
B. 8th August, 1994
C. 15th August, 1995
D. 11th August, 1995
A. A web browser
B. Searching engines
C. Address of the web page displayed on the internet
D. A computer software
What is the full form of the internet?
A. Intercontinental Network
B. Internal Network
C. Interconnected Network
D. International Network
What is the full form of ICANN?
A. The Internet Corporation for Active Names and Numbers
B. The Internet Corporation for Assigned Names and Numbers
C. The Internet Corporation for Archive Names and Numbers
D. The Internet Corporation for Advanced Names and Numbers

What is this