Which of these security threats are invisible to a computer’s operating system?
The answer: B) Rootkit
A rootkit is designed to be stealthy. This stealth may hide in the operating system as a file that appears to be legitimate, or the threat could become part of the kernel and effectively be invisible to the operating system.
Want to know more? Watch “Security Awareness.”
When training your end user community, there are a number of security concerns that must be considered. In this video, you’ll learn which user habits, threat prevention techniques, and business policies should be implemented to keep everyone’s data as safe as possible.