Cryptography MC
Cryptography
Which of the following enables an attacker to hide the presence of malicious code by altering Registry entries?
Which of the following enables an attacker to hide the presence of malicious code by altering Registry entries?
Which of the following enables an attacker to hide the presence of malicious code by altering Registry entries?
A. Worm
B. Logic bomb
C. Rootkit
D. Trojan
Answer: C
Learn More :