Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer
- Ends In
00:00:00
Coupon code:
SAVE25
X
Welcome to Pass4Success
Login
|
Sign up
-
Free
Preparation Discussions
Mail Us
support@pass4success.com
Location
PL
MENU
Home
Popular vendors
Salesforce
Microsoft
Nutanix
Cisco
Amazon
Google
CompTIA
SAP
VMware
Oracle
Fortinet
PeopleCert
Eccouncil
HP
Palo Alto Networks
Adobe
ISC2
ServiceNow
Dell EMC
CheckPoint
Discount Deals
New
About
Contact
Login
Sign up
Home
Discussions
Cisco Discussions
Exam 200-201 Topic 7 Question 75 Discussion
Cisco Exam 200-201 Topic 7 Question 75 Discussion
Actual exam question for Cisco's 200-201 exam
Question #: 75
Topic #: 7
[All 200-201 Questions]
What describes the usage of a rootkit in endpoint based attacks?
A
set of tools used by an attacker to maintain control of a compromised system while avoiding detection
B
exploit that can be used to perform remote code execution
C
set of vulnerabilities used by an attacker lo disable root access on the system
D
remote code execution that causes a denial-of-service on the system
Show Suggested Answer
Hide Answer
Suggested Answer:
A, C
by
Pamella
at
Oct 21, 2023, 12:22 PM
Limited Time Offer
25%
Off
Get Premium 200-201 Questions as Interactive Web-Based Practice Test or PDF
Contribute your Thoughts:
Submit
Cancel
Brandon
1 months ago
Rootkits, the secret sauce that keeps hackers in your computer? I'm gonna have to go with A on this one. Sounds like the most flavorful option.
upvoted
0
times
Carolynn
16 days ago
User 1: I agree, A seems like the most logical choice.
upvoted
0
times
...
...
Natalya
2 months ago
Rootkit, the thing that gives you admin access without anyone knowing? That's definitely A, the one that avoids detection.
upvoted
0
times
Hannah
1 months ago
User 3: So, A is the correct answer then. It's all about avoiding detection.
upvoted
0
times
...
Jennie
1 months ago
User 2: Yeah, that's right. It's like a secret toolset for hackers.
upvoted
0
times
...
Freida
2 months ago
User 1: Rootkits are sneaky, they help attackers maintain control without being detected.
upvoted
0
times
...
...
Deandrea
2 months ago
Rootkit, the tool that lets you take root on someone else's system? Gotta be A, the one that keeps the attacker in charge.
upvoted
0
times
Nana
1 months ago
Exactly, rootkits are all about maintaining control without being detected.
upvoted
0
times
...
Nana
1 months ago
A) set of tools used by an attacker to maintain control of a compromised system while avoiding detection
upvoted
0
times
...
...
Peggie
2 months ago
I'm not sure, but I think it's A) as well. It makes sense for attackers to use rootkits for that purpose.
upvoted
0
times
...
Sherell
2 months ago
Rootkit, huh? That's the one that makes your system root-lessly, right? I'll have to go with C on this one.
upvoted
0
times
...
Carma
2 months ago
I agree with Verdell. Rootkits are definitely used to maintain control without being detected.
upvoted
0
times
...
Delisa
2 months ago
A rootkit? Isn't that what they use to make your computer run like a rocket? I'll go with A, sounds like the one that keeps the bad guys in control.
upvoted
0
times
Kip
20 days ago
User 4: No, that's not it. Rootkits are more about maintaining control without being detected.
upvoted
0
times
...
Reta
23 days ago
User 3: B) exploit that can be used to perform remote code execution
upvoted
0
times
...
Fatima
24 days ago
User 2: Yeah, that's right. Rootkits are used to stay hidden and control the system.
upvoted
0
times
...
Tyisha
2 months ago
User 1: A) set of tools used by an attacker to maintain control of a compromised system while avoiding detection
upvoted
0
times
...
...
Verdell
3 months ago
I think the answer is A) set of tools used by an attacker to maintain control of a compromised system while avoiding detection.
upvoted
0
times
...
Log in to Pass4Success
×
Sign in:
Forgot my password
Log in
Report Comment
×
Is the comment made by
USERNAME
spam or abusive?
Commenting
×
In order to participate in the comments you need to be logged-in.
You can
sign-up
or
login
Save
Cancel
az-700
pass4success
az-104
200-301
200-201
cissp
350-401
350-201
350-501
350-601
350-801
350-901
az-720
az-305
pl-300
Brandon
1 months agoCarolynn
16 days agoNatalya
2 months agoHannah
1 months agoJennie
1 months agoFreida
2 months agoDeandrea
2 months agoNana
1 months agoNana
1 months agoPeggie
2 months agoSherell
2 months agoCarma
2 months agoDelisa
2 months agoKip
20 days agoReta
23 days agoFatima
24 days agoTyisha
2 months agoVerdell
3 months ago