You are responding to an incident involving a Windows server on your company's network. During the investigation you notice that the system downloaded and installed two files, iexplorer.exe and iexplorer.sys. Based on the behavior of the system you suspect that these files are part of a rootkit. If this is the case what is the likely purpose of the .sys file?
Ty
4 months agoKrystal
4 months agoSue
4 months agoMarkus
4 months agoTeri
5 months agoNa
5 months agoJacqueline
5 months agoJaney
5 months agoCyndy
5 months agoRonny
5 months agoCammy
5 months agoBuffy
5 months ago