To invisibly maintain access to a machine, an attacker utilizes a rootkit that sits undetected in the core components of the operating system. What is this type of rootkit an example of?
A. Hypervisor rootkit
B. Kernel rootkit
C. Hardware rootkit
D. Firmware rootkit
A. Hypervisor rootkit
B. Kernel rootkit
C. Hardware rootkit
D. Firmware rootkit