Which of the following terms is used more generally for describing concealment routines in a malicious
program?A. virus
B.
worm
C.
trojan horse
D.
spyware
E.
rootkits
F.
backdoor
G.
None of the choices.
Explanation:
Rootkits can prevent a malicious process from being reported in the process table, or keep its files from being
read. Originally, a rootkit was a set of tools installed by a human attacker on a Unix system where the attacker
had
gained administrator access. Today, the term is used more generally for concealment routines in a malicious
program.