Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCIH Exam - Topic 5 Question 53 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 53
Topic #: 5
[All GCIH Questions]

Which of the following types of rootkits replaces regular application binaries with Trojan fakes and modifies the behavior of existing applications using hooks, patches, or injected code?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Yoko
4 days ago
I’m a bit confused between application level and kernel level rootkits. They both seem to modify behavior, but I feel like application level is more about the binaries.
upvoted 0 times
...
Ben
9 days ago
I remember practicing a question like this, and I think the answer was related to how the rootkit interacts with applications. Could it be A?
upvoted 0 times
...
Tracey
14 days ago
I think this might be the application level rootkit, but I'm not entirely sure. It sounds familiar from the study materials.
upvoted 0 times
...

Save Cancel