Which of the following BEST describes a set of programs and code that allows an undetectable
presence on a system with administrative rights?
A.
Trojan horse
B.
Virus
C.
Rootkit
D.
Worm
Which of the following BEST describes a set of programs and code that allows an undetectable
presence on a system with administrative rights?
Which of the following BEST describes a set of programs and code that allows an undetectable
presence on a system with administrative rights?
A.
Trojan horse
B.
Virus
C.
Rootkit
D.
Worm