A security administrator is reviewing the following information from a file that was found on a compromised host:
cat suspiciousfile.txt
www.CompTIA.orgnjohnmiloveyoun$200nWorking LatenJohnnI%20will%20be%20in% 20the%20office%20till%206pm%20to%20finish%20the%20reportn
Which of the following types of malware is MOST likely installed on the compromised host?
A. Keylogger
B. Spyware
C. Trojan
D. Backdoor
E. Rootkit
Answer: A