List of questions
Related questions
Question 246 - 312-50v12 discussion
To invisibly maintain access to a machine, an attacker utilizes a toolkit that sits undetected In the core components of the operating system. What is this type of rootkit an example of?
A.
Mypervisor rootkit
B.
Kernel toolkit
C.
Hardware rootkit
D.
Firmware rootkit
Your answer:
0 comments
Sorted by
Leave a comment first