CompTIA Exam Questions

Which of the following allows an attacker to hide the presence of malicious code by altering the sys

Which of the following allows an attacker to hide the presence of malicious code by altering the systems process and registry entries?

A.
Logic bomb

B.
Worm

C.
Trojan

D.
Rootkit