Which of the following is the primary objective of a rootkit?
A.
It opens a port to provide an unauthorized service
B.
It creates a buffer overflow
C.
It replaces legitimate programs
D.
It provides an undocumented opening in a program
Explanation:
Actually the objective of the rootkit is more to hide the fact that a system has been compromised and the normal way to do this is by exchanging, for example, ls to a version that doesn’t show the files and process implanted by the attacker.