Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCED Topic 2 Question 52 Discussion

Actual exam question for GIAC's GCED exam
Question #: 52
Topic #: 2
[All GCED Questions]

Which of the following is a major problem that attackers often encounter when attempting to develop or use a kernel mode rootkit?

Show Suggested Answer Hide Answer
Suggested Answer: C

Recent versions of IOS have less services enabled by default, older versions vary but generally have more services (even those not needed) enabled by default; this increases the attack surface on the device.


Contribute your Thoughts:

Honey
26 days ago
Well, I guess the attackers really need to do their homework on the target OS. Option D sounds like the way to go if you want to avoid a nasty kernel corruption surprise.
upvoted 0 times
Leanna
5 days ago
User 2: Yeah, attackers really need to be careful with the target OS.
upvoted 0 times
...
Della
7 days ago
User 1: Option D sounds like the way to go if you want to avoid a nasty kernel corruption surprise.
upvoted 0 times
...
...
Meaghan
29 days ago
I'm going with option A. Those pesky rootkits never seem to work quite right on my system. Must be the special apps I use. *wink wink*
upvoted 0 times
...
Buck
30 days ago
Haha, I bet the attackers wish they could just use a nice, stable rootkit that doesn't crash the system. Option B sounds like a classic case of 'rootkit, meet BSOD'.
upvoted 0 times
Irma
9 days ago
D) They are highly dependent on the target OS.
upvoted 0 times
...
Annice
11 days ago
C) They are unstable and are easy to identify after installation
upvoted 0 times
...
Nadine
14 days ago
B) They tend to corrupt the kernel of the target system, causing it to crash.
upvoted 0 times
...
Gabriele
17 days ago
A) Their effectiveness depends on the specific applications used on the target system.
upvoted 0 times
...
...
Mollie
1 months ago
I disagree, I think option C is the correct answer. Kernel mode rootkits are known to be unstable and easy to detect after installation, which makes them a major problem for attackers.
upvoted 0 times
Fidelia
9 days ago
C) They are unstable and are easy to identify after installation
upvoted 0 times
...
Maryrose
19 days ago
B) They tend to corrupt the kernel of the target system, causing it to crash.
upvoted 0 times
...
Ora
1 months ago
A) Their effectiveness depends on the specific applications used on the target system.
upvoted 0 times
...
...
Jettie
2 months ago
I think option D is the correct answer. Kernel mode rootkits are highly dependent on the target OS, and will not work on systems with different kernel versions or architectures.
upvoted 0 times
Miriam
9 days ago
C) They are unstable and are easy to identify after installation
upvoted 0 times
...
Stephane
14 days ago
B) They tend to corrupt the kernel of the target system, causing it to crash.
upvoted 0 times
...
Lamar
1 months ago
A) Their effectiveness depends on the specific applications used on the target system.
upvoted 0 times
...
...
Stephaine
2 months ago
But don't you think that attackers also struggle with the fact that rootkits can be unstable and easy to identify after installation?
upvoted 0 times
...
Willie
3 months ago
I agree with Stefany. If the target OS changes, the rootkit may not work properly.
upvoted 0 times
...
Stefany
3 months ago
I think the major problem attackers face is that kernel mode rootkits are highly dependent on the target OS.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77