Upon investigation, an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
A.
Trojan
B.
Virus
C.
Logic bomb
D.
Rootkit
Upon investigation, an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
Upon investigation, an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
A.
Trojan
B.
Virus
C.
Logic bomb
D.
Rootkit