Your organization's host was compromised and a rootkit was installed. On the infected machine, where is the rootkit functioning?a. Within the utilities layer.b. Between the Operating system and the utilities.c. Layer 3 of the OSI model where it defeats SSL security.d. Between the hardware and the operating system

Respuesta :

Answer:

The correct answer is letter "B": Between the Operating system and the utilities.

Explanation:

Rootkits are malicious software such as Trojans, worms or viruses themselves that allow unauthorized users to have access to a computer typically hidden from the scope of the user, using for that purpose another frequent application.  Sensitive information like bank credentials can be easily obtained through this type of software. Rootkits are stored between the computer's Operating System (OS) and its utilities like most viruses.