PrepAway - Latest Free Exam Questions & Answers

Category: 312-50v8

Exam 312-50v8: Certified Ethical Hacker (v8)

What privilege level does a rootkit require to infect successfully on a Victim’s machine?

A rootkit is a collection of tools (programs) that enable administrator-level access to a computer.
This program hides itself deep into an operating system for malicious activity and is extremely
difficult to detect. The malicious software operates in a stealth fashion by hiding its files,
processes and registry keys and may be used to create a hidden directory or folder designed to
keep out of view from a user’s operating system and security software.

What privilege level does a rootkit require to infect successfully on a Victim’s machine?

What is odd about this attack?

(Note: the student is being tested on concepts learnt during passive OS fingerprinting, basic
TCP/IP connection concepts and the ability to read packet signatures from a sniff dump.)
Snort has been used to capture packets on the network. On studying the packets, the penetration
tester finds it to be abnormal. If you were the penetration tester, why would you find this
abnormal?
What is odd about this attack? Choose the best answer.


Page 14 of 88« First...1213141516...203040...Last »