A hacker wants to infiltrate a target’s computer to plant malware that allows them undetected privileged access to control the computer. What type of malware would the hacker want to use?
The answer is a rootkit. A rootkit allows a hacker to gain privileged access to a target’s computer while being extremely difficult to detect. The other choices are other types of malware that do not allow for control of the infected computer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a rootkit and how does it work?
Open an interactive chat with Bash
What is the difference between rootkits and other types of malware?
Open an interactive chat with Bash
How can I tell if my computer is infected with a rootkit?