Which of the following allows an attacker to hide the presence of malicious code by altering the systems process and registry entries?

Which of the following allows an attacker to hide the presence of malicious code by altering the systems process and registry entries?

Which of the following allows an attacker to hide the presence of malicious code by altering the systems process and registry entries?

A.
Logic bomb

B.
Worm

C.
Trojan

D.
Rootkit



Leave a Reply 0

Your email address will not be published. Required fields are marked *