A program has been discovered that infects a critical Windows system executable and stays
dormant in memory. When a Windows mobile phone is connected to the host, the program infects
the phone’s boot loader and continues to target additional Windows PCs or phones. Which of the
following malware categories BEST describes this program?
A.
Zero-day
B.
Trojan
C.
Virus
D.
Rootkit