CompTIA Exam Questions

which of the following?

Upon investigation, an administrator finds a suspicious system-level kernel module which modifies
file system operations. This is an example of which of the following?

A.
Trojan

B.
Virus

C.
Logic bomb

D.
Rootkit

Explanation: