Which of the following terms is used more generally for describing concealment routines in a
malicious program?

A.
virus
B.
worm
C.
trojan horse
D.
spyware
E.
rootkits
F.
backdoor
G.
None of the choices.
Explanation:
Rootkits can prevent a malicious process from being reported in the process table, or keep its files
from being read. Originally, a rootkit was a set of tools installed by a human attacker on a Unix
system where the attacker had gained administrator access. Today, the term is used more generally
for concealment routines in a malicious program.