Which of these would best describe a rootkit?
A) Presents a spoofed login screen in an effort to obtain your credentials
B) Can be controlled through the use of LCD screen filters
C) Usually invisible to the operating system
D) Replicates without any human intervention
E) As it turns out, it’s not at all like root beer
The answer: C) Usually invisible to the operating system
Rootkits are designed to hide in the operating system to avoid detection by humans or anti-malware software.
Want to know more? Watch “Common Security Threats.”
There are many security threats constantly attacking our computers and our data. In this video, you’ll learn about social engineering, shoulder surfing, malware, rootkits, and much more.