A set of programs that allows someone to gain control over a computer while hiding that the computer has been compromised is a(n) ________

A) adware script B) rootkit C) firewall D) keylogger

B

Computer Science & Information Technology

You might also like to view...

What is required prior to signing up for a Google account?

A) A Gmail password B) An email address C) A Google password D) A Gmail account

Computer Science & Information Technology

A(n) ________ virus executes each time your computer starts up

A) boot-sector B) patch C) security hole D) worm

Computer Science & Information Technology