Problem
1. List some the different levels in a system that a rootkit may use.
2. Describe some malware countermeasure elements.
3. List three places malware mitigation mechanisms may be located.
4. Briefly describe the four generations of anti-virus software.