Malware can use virtualization techniques. Why would this be difficult to detect?
A. A portion of the malware might have already been removed by an IDS.
B. The malware might be using a Trojan.
C. The malware could be running at a more privileged level than the computer's antivirus software.
D. The malware might be running in the command-line.
Answer: C