1.Describe in your own words what a rootkit is.
 An initial post must be between 250-300 words. needed replies too.

2.Tech companies prepare for cyberattacks using common cybersecurity resources. Select one of the resources listed and explain how you could implement that particular policy to prevent an attack: 1. monitoring and assessment, 2. policies and controls, 3. hiring, 4. software, 5. firewalls, 6. authentication and access, 7. encryption. Needed 2 replies too

3.Search the Internet and locate an article that relates to the topic of HACKING.