exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 15 discussion

Actual exam question from Cisco's 350-701
Question #: 15
Topic #: 1
[All 350-701 Questions]

What are two rootkit types? (Choose two.)

  • A. registry
  • B. buffer mode
  • C. user mode
  • D. bootloader
  • E. virtual
Show Suggested Answer Hide Answer
Suggested Answer: CD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Iarn
Highly Voted 2 years, 6 months ago
Selected Answer: CD
1. Kernel rootkit 2. Hardware or firmware rootkit 3. Hyper-V rootkits 4. Bootloader rootkit or bootkit 5. Memory rootkit 6. User-mode or application rootkit
upvoted 10 times
...
Cock
Highly Voted 2 years, 10 months ago
C&D. https://heimdalsecurity.com/blog/rootkit/
upvoted 6 times
...
Marshpillowz
Most Recent 6 months, 4 weeks ago
Selected Answer: CD
User mode and bootloader - C and D
upvoted 1 times
...
sull3y
1 year, 9 months ago
C. User mode D. Bootloader A rootkit is a type of malicious software that is designed to hide itself and its activities from the system and its users. There are several types of rootkits, but the two most common are user-mode and bootloader rootkits. A user-mode rootkit runs at the same privilege level as a normal application and is able to intercept and modify system calls made by other processes. It can also hide its presence by modifying the output of system commands such as "ps" or "netstat" A bootloader rootkit infects the system's bootloader, which is the first piece of software that runs when a computer starts up. By infecting the bootloader, a rootkit can ensure that it is loaded before the operating system, making it difficult for the system to detect and remove it. Additionally, it can also hide its presence by modifying the output of system commands such as "ps" or "netstat" Option A, registry, is a database in Windows operating systems that stores configuration settings and options for the operating system, applications, and users. Registry is not a type of rootkit.
upvoted 5 times
...
DeepaBP
2 years, 11 months ago
Please ignore the first comment C & D is the correct answer, Kernel, user, bootloader and Memory are the 4 types of rootkits,
upvoted 5 times
...
DeepaBP
2 years, 11 months ago
B &C is the correct answer kernel Rootkit, User Mode Rootkits, Buffer Mode Rootkit and Memory Rootkits are the four
upvoted 1 times
...
jonsmackface
2 years, 11 months ago
https://en.wikipedia.org/wiki/Rootkit#Types User mode (C) Bootkits (D)
upvoted 2 times
...
jairusster
3 years, 1 month ago
User-mode or application rootkit - User-mode rootkits are simpler and easier to detect than kernel or boot record rootkits. This is because they hide within an application itself, and not system-critical files. In other words, they operate at the level of standard programs such as Paint, Word, PC games and so on. This means a good antivirus or anti-rootkit program will probably find the malware and then remove it.
upvoted 1 times
...
Sarbi
3 years, 2 months ago
The correct answer is Bootloader and Virtual toll kit.There is no user-mode tool kit. Hypervisor (Virtualized) Level Rootkits: Hypervisor (Virtualized) Level Rootkits are created by exploiting hardware features such as Intel VT or AMD-V (Hardware assisted virtualization technologies). Hypervisor level rootkits hosts the target operating system as a virtual machine and therefore they can intercept all hardware calls made by the target operating system. Boot loader Level (Bootkit) Rootkits: Boot loader Level (Bootkit) Rootkits replaces or modifies the legitimate boot loader with another one thus enabling the Boot loader Level (Bootkit) to be activated even before the operating system is started. Boot loader Level (Bootkit) Rootkits are serious threat to security because they can be used to hack the encryption keys and passwords.
upvoted 3 times
capwapap555
3 years, 2 months ago
https://resources.infosecinstitute.com/topic/rootkits-user-mode-kernel-mode-part-1/
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago