Question 2 Read the following scenario and then answer the questions that follow. Most of the users access the corporate database via a web server. The default root directory of data repository web server is C:\corporatedata\wwwroot. Noted is the following: • Administrator users have access to this directory and all the other subdirectories beneath this root. • Team members have access to this directory and only to the “faculty” and “admin” subdirectories beneath this root. • Students only have access to the “student material” subdirectories beneath this root. Q.2.1 After scanning the system, you suspect that malicious code has infected the data repository files. Explain the reason why it is difficult to handle the infection if the files were infected through a rootkit.
Question 2
Read the following scenario and then answer the questions that follow.
Most of the users access the corporate
data repository web server is C:\corporatedata\wwwroot.
Noted is the following:
• Administrator users have access to this directory and all the other subdirectories beneath
this root.
• Team members have access to this directory and only to the “faculty” and “admin”
subdirectories beneath this root.
• Students only have access to the “student material” subdirectories beneath this root.
Q.2.1 After scanning the system, you suspect that malicious code has infected the data
repository files.
Explain the reason why it is difficult to handle the infection if the files were
infected through a rootkit.
Q.2.2 Discuss Denial of Service (DoS) as one of the server attacks and describe any two
different types of DoS attack.
![](/static/compass_v2/shared-icons/check-mark.png)
Step by step
Solved in 2 steps
![Blurred answer](/static/compass_v2/solution-images/blurred-answer.jpg)
![A Guide to SQL](https://www.bartleby.com/isbn_cover_images/9781111527273/9781111527273_smallCoverImage.gif)
![A Guide to SQL](https://www.bartleby.com/isbn_cover_images/9781111527273/9781111527273_smallCoverImage.gif)