Which of the following threats changes system functionality at the operating system level for
a malicious purpose by gaining administrative access after being installed by a user?
A.
Botnet
B.
Trojan
C.
Worm
D.
Rootkit
Which of the following threats changes system functionality at the operating system level for
a malicious purpose by gaining administrative access after being installed by a user?
Which of the following threats changes system functionality at the operating system level for
a malicious purpose by gaining administrative access after being installed by a user?
A.
Botnet
B.
Trojan
C.
Worm
D.
Rootkit