Okay, the key things I see are the list of binary logs and the mysqldump command that deletes the master logs. I think the answer has to do with what gets backed up and what gets deleted.
I'm a bit unsure about the "accelerators" option. Not sure how that would directly address the specific issues mentioned in the question. I'll need to think that one through more carefully.
I think the answer is D - Evaluation and acceptance. That's the phase where the system is tested and accepted by the client, which would involve ensuring the design specs are met and proper documentation/training is provided.
The key details here are that it can hide processes, files, registry entries, and intercept keystrokes. That sounds like the capabilities of a RootKit to me.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Noel
4 months agoMarkus
4 months agoAja
4 months agoKeshia
4 months agoKate
4 months agoLavonna
5 months agoGerald
5 months agoAnnita
5 months agoDeonna
5 months agoTresa
5 months agoLettie
5 months agoChi
5 months agoJudy
5 months agoJesusa
5 months agoViva
5 months ago