Which option is correct about the relationship between the malware type and its description?
1. virus
2. worms
3. botnets
4. spyware
5. Trojan horses
6. rootkits
(a) collection of compromised computers under a common command-and-control infrastructure
(b) typically used to monitor user actions
(c) autonomously spreads to other systems without user interaction
(d) malware that hides through evasion of the operating system security mechanisms
(e) requires some user action to infect the system
(f) malware that hides inside anoter legitimate looking application
A.
a-3,b-4,c-2,d-6,e-1,f-5
B.
a-3,b-2,c-1,d-4,e-6,f-5
C.
a-3,b-4,c-2,d-6,e-5,f-1
D.
a-3,b-4,c-6,d-2,e-1,f-5