Identify the type of malware that exploits system vulnerabilities for unauthorized access:
Worm
Virus
Trojan horse
Rootkit

Cybersecurity Management Exercises are loading ...