Which of the following allows an attacker to embed a rootkit into a picture?

Which of the following allows an attacker to embed a rootkit into a picture?

Which of the following allows an attacker to embed a rootkit into a picture?

A.
Trojan horse

B.
Worm

C.
Steganography

D.
Virus



Leave a Reply 0

Your email address will not be published. Required fields are marked *