Which of these best describes a rootkit?
A) Replicates itself without any human intervention
B) Can be invisible to the operating system
C) Tricks the user into providing private information
D) Controlled from a central network source
E) Encrypts drive contents and requires payment to decrypt
F) Is delicious over ice cream
The answer: B) Can be invisible to the operating system
Rootkits are unique in their invisibility, and it’s difficult to find and remove a rootkit because of its stealth-like nature.
Want to know more? Watch “Common Security Threats.”
There are many security threats constantly attacking our computers and our data. In this video, you’ll learn about social engineering, shoulder surfing, malware, rootkits, and much more.