Friday 27 October 2017

GIAC GCIH Question Answer

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

A. Shoulder surfing
B. File integrity auditing
C. Reconnaissance
D. Spoofing

Answer: B

Which of the following rootkits is able to load the original operating system as a virtual machine, thereby enabling it to intercept all hardware calls made by the original operating system?

A. Kernel level rootkit
B. Boot loader rootkit
C. Hypervisor rootkit
D. Library rootkit

Answer: C

No comments:

Post a Comment

Note: only a member of this blog may post a comment.