Which of these would best describe a rootkit?
A) Presents a spoofed login screen in an effort to obtain your credentials
B) Can be controlled through the use of LCD screen filters
C) Usually invisible to the operating system
D) Replicates without any human intervention
E) As it turns out, it’s not at all like root beer
Pages: 1 2