Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCED Topic 2 Question 52 Discussion

Actual exam question for GIAC's GCED exam
Question #: 52
Topic #: 2
[All GCED Questions]

Which of the following is a major problem that attackers often encounter when attempting to develop or use a kernel mode rootkit?

Show Suggested Answer Hide Answer
Suggested Answer: C

Recent versions of IOS have less services enabled by default, older versions vary but generally have more services (even those not needed) enabled by default; this increases the attack surface on the device.


Contribute your Thoughts:

Honey
28 days ago
Well, I guess the attackers really need to do their homework on the target OS. Option D sounds like the way to go if you want to avoid a nasty kernel corruption surprise.
upvoted 0 times
Fausto
1 days ago
User 3: Their effectiveness really depends on the OS they are targeting.
upvoted 0 times
...
Leanna
7 days ago
User 2: Yeah, attackers really need to be careful with the target OS.
upvoted 0 times
...
Della
9 days ago
User 1: Option D sounds like the way to go if you want to avoid a nasty kernel corruption surprise.
upvoted 0 times
...
...
Meaghan
1 months ago
I'm going with option A. Those pesky rootkits never seem to work quite right on my system. Must be the special apps I use. *wink wink*
upvoted 0 times
...
Buck
1 months ago
Haha, I bet the attackers wish they could just use a nice, stable rootkit that doesn't crash the system. Option B sounds like a classic case of 'rootkit, meet BSOD'.
upvoted 0 times
Irma
11 days ago
D) They are highly dependent on the target OS.
upvoted 0 times
...
Annice
13 days ago
C) They are unstable and are easy to identify after installation
upvoted 0 times
...
Nadine
16 days ago
B) They tend to corrupt the kernel of the target system, causing it to crash.
upvoted 0 times
...
Gabriele
19 days ago
A) Their effectiveness depends on the specific applications used on the target system.
upvoted 0 times
...
...
Mollie
1 months ago
I disagree, I think option C is the correct answer. Kernel mode rootkits are known to be unstable and easy to detect after installation, which makes them a major problem for attackers.
upvoted 0 times
Fidelia
11 days ago
C) They are unstable and are easy to identify after installation
upvoted 0 times
...
Maryrose
21 days ago
B) They tend to corrupt the kernel of the target system, causing it to crash.
upvoted 0 times
...
Ora
1 months ago
A) Their effectiveness depends on the specific applications used on the target system.
upvoted 0 times
...
...
Jettie
2 months ago
I think option D is the correct answer. Kernel mode rootkits are highly dependent on the target OS, and will not work on systems with different kernel versions or architectures.
upvoted 0 times
Miriam
11 days ago
C) They are unstable and are easy to identify after installation
upvoted 0 times
...
Stephane
16 days ago
B) They tend to corrupt the kernel of the target system, causing it to crash.
upvoted 0 times
...
Lamar
1 months ago
A) Their effectiveness depends on the specific applications used on the target system.
upvoted 0 times
...
...
Stephaine
3 months ago
But don't you think that attackers also struggle with the fact that rootkits can be unstable and easy to identify after installation?
upvoted 0 times
...
Willie
3 months ago
I agree with Stefany. If the target OS changes, the rootkit may not work properly.
upvoted 0 times
...
Stefany
3 months ago
I think the major problem attackers face is that kernel mode rootkits are highly dependent on the target OS.
upvoted 0 times
...

Save Cancel