Which of the following allows an attacker to embed a rootkit into a picture?
A.
Trojan horse
B.
Worm
C.
Steganography
D.
Virus
Which of the following allows an attacker to embed a rootkit into a picture?
Which of the following allows an attacker to embed a rootkit into a picture?
A.
Trojan horse
B.
Worm
C.
Steganography
D.
Virus