ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 590 - 312-49v10 discussion

Report
Export

Which of these rootkit detection techniques function by comparing a snapshot of the file system, boot records, or memory with a known and trusted baseline?

A.
Signature-Based Detection
Answers
A.
Signature-Based Detection
B.
Integrity-Based Detection
Answers
B.
Integrity-Based Detection
C.
Cross View-Based Detection
Answers
C.
Cross View-Based Detection
D.
Heuristic/Behavior-Based Detection
Answers
D.
Heuristic/Behavior-Based Detection
Suggested answer: B
asked 18/09/2024
Johnny Tien
47 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first