ECCouncil Certified Ethical Hacker Exam (CEHv12) 312-50v12 Question # 21 Topic 3 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv12) 312-50v12 Question # 21 Topic 3 Discussion

312-50v12 Exam Topic 3 Question 21 Discussion:
Question #: 21
Topic #: 3

To invisibly maintain access to a machine, an attacker utilizes a toolkit that sits undetected In the core components of the operating system. What is this type of rootkit an example of?


A.

Mypervisor rootkit


B.

Kernel toolkit


C.

Hardware rootkit


D.

Firmware rootkit


Get Premium 312-50v12 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.