ECCouncil Exam Questions

Which of the following Linux rootkits allows attackers to hide files, processes, and network connec

Which of the following Linux rootkits allows attackers to hide files, processes, and network

connections?
Each correct answer represents a complete solution. Choose all that apply.

A.
Phalanx2

B.
Adore

C.
Knark

D.
Beastkit

Explanation: