Which of the following are valid types of rootkits? (Choose three.)
A.
Hypervisor level
B.
Network level
C.
Kernel level
D.
Application level
E.
Physical level
F.
Data access level
Which of the following are valid types of rootkits? (Choose three.)
Which of the following are valid types of rootkits? (Choose three.)
A.
Hypervisor level
B.
Network level
C.
Kernel level
D.
Application level
E.
Physical level
F.
Data access level