Which malware is installed on a compromised system and provides privileged access to the threat actor?
- Adware
- Virus
- Spyware
- Rootkit
- Worm
Explanation: Rootkits are used by threat actors to gain administrator account-level access to a computer. They are very difficult to detect because they can alter firewall, antivirus protection, system files, and even OS commands to conceal their presence.
Exam with this question: 3.4.4 Check Your Understanding - Malware
Please login or Register to submit your answer