Skip to content

Certified Ethical Hacker v11 312-50v11

  • Certified Ethical Hacker v11 312-50v11

Tag: Question 166

Certified Ethical Hacker v11 312-50v11 – Question166

To invisibly maintain access to a machine, an attacker utilizes a rootkit that sits undetected in the core components of the operating system. What is this type of rootkit an example of?

A.
Hypervisor rootkit
B. Kernel rootkit
C. Hardware rootkit
D. Firmware rootkit

Correct Answer: B

Tagged Certified Ethical Hacker v11 312-50v11, Question 166
Download all the questions as a printable PDF file from here
Exam Practice Tests

Please disable your adblocker or whitelist this site!