ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 51 - H12-724 discussion

Report
Export

Malicious code usually uses RootKit technology in order to hide itself. RootKit modifies the kernel of the system by loading a special driver.

To hide itself and the role of designated files.

A.
True
Answers
A.
True
B.
False
Answers
B.
False
Suggested answer: A
asked 18/09/2024
Nicolas Da Silva
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first