A hacker wants to infiltrate a target’s computer to plant malware that allows them undetected privileged access to control the computer. What type of malware would the hacker want to use?
The answer is a rootkit. A rootkit allows a hacker to gain privileged access to a target’s computer while being extremely difficult to detect. The other choices are other types of malware that do not allow for control of the infected computer.
Learn More
AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a rootkit and how does it work?
What is the difference between rootkits and other types of malware?
How can I tell if my computer is infected with a rootkit?