List of questions
Related questions
Question 51 - H12-724 discussion
Malicious code usually uses RootKit technology in order to hide itself. RootKit modifies the kernel of the system by loading a special driver.
To hide itself and the role of designated files.
A.
True
B.
False
Your answer:
0 comments
Sorted by
Leave a comment first