Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 200-201 Topic 7 Question 75 Discussion

Actual exam question for Cisco's 200-201 exam
Question #: 75
Topic #: 7
[All 200-201 Questions]

What describes the usage of a rootkit in endpoint based attacks?

Show Suggested Answer Hide Answer
Suggested Answer: A, C

Contribute your Thoughts:

Natalya
2 days ago
Rootkit, the thing that gives you admin access without anyone knowing? That's definitely A, the one that avoids detection.
upvoted 0 times
...
Deandrea
14 days ago
Rootkit, the tool that lets you take root on someone else's system? Gotta be A, the one that keeps the attacker in charge.
upvoted 0 times
...
Peggie
15 days ago
I'm not sure, but I think it's A) as well. It makes sense for attackers to use rootkits for that purpose.
upvoted 0 times
...
Sherell
15 days ago
Rootkit, huh? That's the one that makes your system root-lessly, right? I'll have to go with C on this one.
upvoted 0 times
...
Carma
17 days ago
I agree with Verdell. Rootkits are definitely used to maintain control without being detected.
upvoted 0 times
...
Delisa
23 days ago
A rootkit? Isn't that what they use to make your computer run like a rocket? I'll go with A, sounds like the one that keeps the bad guys in control.
upvoted 0 times
...
Verdell
1 months ago
I think the answer is A) set of tools used by an attacker to maintain control of a compromised system while avoiding detection.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77