_________ is a tool that can hide processes from the process list, can hide files, registry entries, and intercept keystrokes.
Trojan
RootKit
DoS tool
Scanner
Backdoor
A rootkit is a type of stealth malware designed to hide the existence of certain processes or programs from normal detection methods. It can:
Hide itself and other processes
Conceal files and registry entries
Intercept system calls or keystrokes (keylogging)
Maintain persistent access
From CEH v13 Courseware:
Module 6: Malware Threats → Rootkits
Incorrect Options:
A: A Trojan may offer remote access but doesn't necessarily hide itself.
C: DoS tools are used to overload systems, not hide.
D: Scanners detect vulnerabilities, not conceal activities.
E: A backdoor may provide unauthorized access, but rootkits focus on hiding.
Submit