.David, a content writer, was searching online for a specific topic. He visited a web page that appears legitimate and downloaded a file. As soon as he downloaded the file, his laptop started to behave in a weird manner. Out of suspicion, he scanned the laptop for viruses but found nothing.
Which of the following programs conceals the malicious code of malware via various techniques, making it difficult for security mechanisms to detect or remove it?
A Exploit
B Downloader
C Obfuscator
D Payload