Certified Ethical Hacker – CEH – 312-50 – Question123

How can a rootkit bypass Windows 7 operating systems kernel mode, code signing policy?


A.
Defeating the scanner from detecting any code change at the kernel
B. Replacing patch system calls with its own version that hides the rootkit (attacker's) actions
C. Performing common services for the application process and replacing real applications with fake ones
D. Attaching itself to the master boot record in a hard drive and changing the machine's boot sequence/options

Correct Answer: D

Certified Ethical Hacker – CEH – 312-50 – Question122

What is the best defense against privilege escalation vulnerability?


A.
Patch systems regularly and upgrade interactive login privileges at the system administrator level.
B. Run administrator and applications on least privileges and use a content registry for tracking.
C. Run services with least privileged accounts and implement multi-factor authentication and authorization.
D. Review user roles and administrator privileges for maximum utilization of automation services.

Correct Answer: C