ECCouncil Certified Ethical Hacker Exam (CEH v11) 312-50v11 Question # 69 Topic 7 Discussion

ECCouncil Certified Ethical Hacker Exam (CEH v11) 312-50v11 Question # 69 Topic 7 Discussion

312-50v11 Exam Topic 7 Question 69 Discussion:
Question #: 69
Topic #: 7

To invisibly maintain access to a machine, an attacker utilizes a toolkit that sits undetected In the core components of the operating system. What is this type of rootkit an example of?


A.

Mypervisor rootkit


B.

Kernel toolkit


C.

Hardware rootkit


D.

Firmware rootkit


Get Premium 312-50v11 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.