Which of the following is designed to alter system files and utilities on a victim’s system with the intention of changing the way a system behaves? A. Rootkit B. Virus C. Worm D. Trojan