Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?
A. Shoulder surfing
B. File integrity auditing
C. Reconnaissance
D. Spoofing
Answer: B
Which of the following rootkits is able to load the original operating system as a virtual machine, thereby enabling it to intercept all hardware calls made by the original operating system?
A. Kernel level rootkit
B. Boot loader rootkit
C. Hypervisor rootkit
D. Library rootkit
Answer: C
No comments:
Post a Comment
Note: only a member of this blog may post a comment.