_________ is a tool that can hide processes from the process list, can hide files, registry entries, and intercept keystrokes.
A.
Trojan
B.
RootKit
C.
DoS tool
D.
Scanner
E.
Backdoor
Explanation:
Rootkits are tools that can hide processes from the process list, can hide files, registry entries, and intercept keystrokes.