Which of these best describes a rootkit?
A) Replicates itself without any human intervention
B) Can be invisible to the operating system
C) Tricks the user into providing private information
D) Controlled from a central network source
E) Encrypts drive contents and requires payment to decrypt
F) Is delicious over ice cream
Pages: 1 2