Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Exam GCIH All Questions
Exam GCIH All Questions

View all questions & answers for the GCIH exam

GIAC Security Administration GCIH Question # 6 Topic 1 Discussion

GCIH Exam Topic 1 Question 6 Discussion:
Question #: 6
Topic #: 1

Which of the following rootkits is used to attack against full disk encryption systems?


A.

Boot loader rootkit


B.

Library rootkit


C.

Hypervisor rootkit


D.

Kernel level rootkit


Get Premium GCIH Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.