ExamGecko
Question list
Search
Search

Related questions











Question 246 - 312-50v12 discussion

Report
Export

To invisibly maintain access to a machine, an attacker utilizes a toolkit that sits undetected In the core components of the operating system. What is this type of rootkit an example of?

A.
Mypervisor rootkit
Answers
A.
Mypervisor rootkit
B.
Kernel toolkit
Answers
B.
Kernel toolkit
C.
Hardware rootkit
Answers
C.
Hardware rootkit
D.
Firmware rootkit
Answers
D.
Firmware rootkit
Suggested answer: B

Explanation:

Kernel-mode rootkits run with the best operating system privileges (Ring 0) by adding code or replacement parts of the core operating system, as well as each the kernel and associated device drivers. Most operative systems support kernel- mode device drivers, that execute with a similar privileges because the software itself. As such, several kernel-mode rootkits square measure developed as device drivers or loadable modules, like loadable kernel modules in Linux or device drivers in Microsoft Windows. This category of rootkit has unrestricted security access, however is tougher to jot down. The quality makes bugs common, and any bugs in code operative at the kernel level could seriously impact system stability, resulting in discovery of the rootkit. one amongst the primary wide familiar kernel rootkits was developed for Windows NT four.0 and discharged in Phrack magazine in 1999 by Greg Hoglund. Kernel rootkits is particularly tough to observe and take away as a result of they operate at a similar security level because the software itself, and square measure therefore able to intercept or subvert the foremost sure software operations. Any package, like antivirus package, running on the compromised system is equally vulnerable. during this scenario, no a part of the system is sure.

asked 18/09/2024
Daniel Vong
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first