Full disk encryption BIOS password Password protected files Hidden folders admin See author's posts Post navigation A penetration test was done at a company. After the test, a report was written and given to the companys IT authorities. A section from the report is shown below: a.Access List should be written between VLANs. b.Port security should be enabled for the intranet. c.A security solution which filters data packets should be set between intranet (LAN) and DMZ. d.A WAF should be used in front of the web applications. According to the section from the report, which of the following choice is true? Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?