Which of the following BEST describes a set of programs and code that allows an undetectable presence on a system with administrative rights?

Which of the following BEST describes a set of programs and code that allows an undetectable
presence on a system with administrative rights?

Which of the following BEST describes a set of programs and code that allows an undetectable
presence on a system with administrative rights?

A.
Trojan horse

B.
Virus

C.
Rootkit

D.
Worm



Leave a Reply 0

Your email address will not be published. Required fields are marked *