Which of the following allows an attacker to hide the presence of malicious code by altering the systems process and registry entries?
A.
Logic bomb
B.
Worm
C.
Trojan
D.
Rootkit
Which of the following allows an attacker to hide the presence of malicious code by altering the systems process and registry entries?
Which of the following allows an attacker to hide the presence of malicious code by altering the systems process and registry entries?
A.
Logic bomb
B.
Worm
C.
Trojan
D.
Rootkit