ECCouncil Computer Hacking Forensic Investigator (V9) 312-49v9 Question # 134 Topic 14 Discussion

ECCouncil Computer Hacking Forensic Investigator (V9) 312-49v9 Question # 134 Topic 14 Discussion

312-49v9 Exam Topic 14 Question 134 Discussion:
Question #: 134
Topic #: 14

Which of these rootkit detection techniques function by comparing a snapshot of the file system, boot records, or memory with a known and trusted baseline?


A.

Signature-Based Detection


B.

Integrity-Based Detection


C.

Cross View-Based Detection


D.

Heuristic/Behavior-Based Detection


Get Premium 312-49v9 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.