A set of programs that allows someone to gain control over a computer while hiding that the computer has been compromised is a(n) ________
A) adware script B) rootkit C) firewall D) keylogger
B
Computer Science & Information Technology
You might also like to view...
What is required prior to signing up for a Google account?
A) A Gmail password B) An email address C) A Google password D) A Gmail account
Computer Science & Information Technology
A(n) ________ virus executes each time your computer starts up
A) boot-sector B) patch C) security hole D) worm
Computer Science & Information Technology