Which of the following is NOT true about RATs?
a. A RAT gives the threat agent unauthorized remote access to the victim's computer by using specially configured communication protocols.
b. A RAT and a worm have the same basic function.
c. A RAT allows the attacker to not only monitor what the user is doing but also can change computer settings, browse and copy files, and even use the computer to access other computers connected on the network.
d. A RAT creates an opening into the victim's computer, allowing the threat actor unrestricted access.