No, that’s root BEER



Which of these best describes a rootkit?

A) Replicates itself without any human intervention

B) Can be invisible to the operating system

C) Tricks the user into providing private information

D) Controlled from a central network source

E) Encrypts drive contents and requires payment to decrypt

F) Is delicious over ice cream