Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 125 Topic 13 Discussion

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 125 Topic 13 Discussion

312-49v11 Exam Topic 13 Question 125 Discussion:
Question #: 125
Topic #: 13

During a high-stakes malware investigation, your team discovered a suspicious device driver on a compromised server. Upon analyzing the driver ' s behavior in a sandboxed environment, you notice that it is frequently accessing low-level system resources that are not typically needed by legitimate drivers. You suspect that this driver might be used as a rootkit. What technique might the rootkit be employed to evade detection?


A.

It might be cloaking its process with a legitimate system process.


B.

It might be using a zero-day vulnerability.


C.

It could be using kernel patching.


D.

It might be hooking into a legitimate driver.


Get Premium 312-49v11 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.