A hacker wants to infiltrate a target’s computer to plant malware that allows them undetected privileged access to control the computer. What type of malware would the hacker want to use?
The answer is a rootkit. A rootkit allows a hacker to gain privileged access to a target’s computer while being extremely difficult to detect. The other choices are other types of malware that do not allow for control of the infected computer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a rootkit and how does it work?
Open an interactive chat with Bash
How does a rootkit differ from other malware like Trojans and viruses?
Open an interactive chat with Bash
What are some signs that a rootkit may be present on a system?