Which of the following refers to software designed to alter system files and utilities on a victim’s system with the intention of changing the way a system behaves?

Keystroke loggers

Backdoors

Rainbow tables

Rootkits