List of questions
Related questions
Question 590 - 312-49v10 discussion
Which of these rootkit detection techniques function by comparing a snapshot of the file system, boot records, or memory with a known and trusted baseline?
A.
Signature-Based Detection
B.
Integrity-Based Detection
C.
Cross View-Based Detection
D.
Heuristic/Behavior-Based Detection
Your answer:
0 comments
Sorted by
Leave a comment first