Which malware attempts to embed itself deeply into a system in order to hide itself and other items, such as files, folders, or even executable processes?

A. Rootkit
B. Trojan horse
C. Worm
D. Virus

Answer: A. Rootkit

Computer Science & Information Technology

You might also like to view...

When arguments are passed by __________, the caller allows the called function to modify the original variable’s value.

a) value b) reference c) both a and b (d) none of these

Computer Science & Information Technology

What sorting algorithm is implemented by the following function?

void sort(int arr[]) { int n = arr.length; for (int i = 0; i < n-1; i++) { int min_idx = i; for (int j = i+1; j < n; j++) if (arr[j] < arr[min_idx]) min_idx = j; int temp = arr[min_idx]; arr[min_idx] = arr[i]; arr[i] = temp; } } a. Selection sort. b. Bubble Sort. c. Quick sort. d. Merge Sort.

Computer Science & Information Technology