Which of the following terms is used more generally for describing concealment routines in a
None of the choices.
Rootkits can prevent a malicious process from being reported in the process table, or keep its files
from being read. Originally, a rootkit was a set of tools installed by a human attacker on a Unix
system where the attacker had
gained administrator access. Today, the term is used more generally for concealment routines in a