By definition, a rootkit does which of the following?
A. Appears to be useful software until it is installed and fully activated
B. Hides the existence of certain processes and programs to provide elevated privileges
C. Replicates by being copied or causing itself to be copied to another program
D. Travels from computer to computer using the native transport protocols available