Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCED Topic 2 Question 52 Discussion

Actual exam question for GIAC's GCED exam
Question #: 52
Topic #: 2
[All GCED Questions]

Which of the following is a major problem that attackers often encounter when attempting to develop or use a kernel mode rootkit?

Show Suggested Answer Hide Answer
Suggested Answer: C

Recent versions of IOS have less services enabled by default, older versions vary but generally have more services (even those not needed) enabled by default; this increases the attack surface on the device.


Contribute your Thoughts:

Honey
3 months ago
Well, I guess the attackers really need to do their homework on the target OS. Option D sounds like the way to go if you want to avoid a nasty kernel corruption surprise.
upvoted 0 times
Fausto
2 months ago
User 3: Their effectiveness really depends on the OS they are targeting.
upvoted 0 times
...
Leanna
2 months ago
User 2: Yeah, attackers really need to be careful with the target OS.
upvoted 0 times
...
Della
2 months ago
User 1: Option D sounds like the way to go if you want to avoid a nasty kernel corruption surprise.
upvoted 0 times
...
...
Meaghan
3 months ago
I'm going with option A. Those pesky rootkits never seem to work quite right on my system. Must be the special apps I use. *wink wink*
upvoted 0 times
...
Buck
3 months ago
Haha, I bet the attackers wish they could just use a nice, stable rootkit that doesn't crash the system. Option B sounds like a classic case of 'rootkit, meet BSOD'.
upvoted 0 times
Irma
2 months ago
D) They are highly dependent on the target OS.
upvoted 0 times
...
Annice
2 months ago
C) They are unstable and are easy to identify after installation
upvoted 0 times
...
Nadine
2 months ago
B) They tend to corrupt the kernel of the target system, causing it to crash.
upvoted 0 times
...
Gabriele
2 months ago
A) Their effectiveness depends on the specific applications used on the target system.
upvoted 0 times
...
...
Mollie
3 months ago
I disagree, I think option C is the correct answer. Kernel mode rootkits are known to be unstable and easy to detect after installation, which makes them a major problem for attackers.
upvoted 0 times
Fidelia
2 months ago
C) They are unstable and are easy to identify after installation
upvoted 0 times
...
Maryrose
2 months ago
B) They tend to corrupt the kernel of the target system, causing it to crash.
upvoted 0 times
...
Ora
3 months ago
A) Their effectiveness depends on the specific applications used on the target system.
upvoted 0 times
...
...
Jettie
3 months ago
I think option D is the correct answer. Kernel mode rootkits are highly dependent on the target OS, and will not work on systems with different kernel versions or architectures.
upvoted 0 times
Miriam
2 months ago
C) They are unstable and are easy to identify after installation
upvoted 0 times
...
Stephane
2 months ago
B) They tend to corrupt the kernel of the target system, causing it to crash.
upvoted 0 times
...
Lamar
3 months ago
A) Their effectiveness depends on the specific applications used on the target system.
upvoted 0 times
...
...
Stephaine
4 months ago
But don't you think that attackers also struggle with the fact that rootkits can be unstable and easy to identify after installation?
upvoted 0 times
...
Willie
4 months ago
I agree with Stefany. If the target OS changes, the rootkit may not work properly.
upvoted 0 times
...
Stefany
4 months ago
I think the major problem attackers face is that kernel mode rootkits are highly dependent on the target OS.
upvoted 0 times
...

Save Cancel