Averyruss37611go Averyruss37611go Computers and Technology Answered chapter 11 which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs?