A security analyst has concerns about malware on an endpoint. The malware is unable to detonate by modifying the kernel response to various system calls. As a test, the analyst modifies a Windows server to respond to system calls as if it was a Linux server. In another test, the analyst modifies the operating system to prevent the malware from identifying target files. Which of the following techniques is the analyst MOST likely using?
Amin4799
Highly Voted 2 years, 2 months agodeeden
Most Recent 6 months, 2 weeks ago881cfb8
6 months, 3 weeks agoBright07
6 months, 3 weeks agorice3cooker
9 months, 1 week agoEAlonso
11 months, 2 weeks agorice3cooker
11 months, 3 weeks agoSangSang
1 year agoe020fdc
1 year, 4 months agoAnarckii
1 year, 6 months agoAnarckii
1 year, 6 months agoAnarckii
1 year, 6 months agonuel_12
1 year, 7 months agohheerreessjjoohhnnyy
1 year, 8 months agoPOWNED
1 year, 8 months agoMeep123
1 year, 8 months agoMeep123
1 year, 8 months agoimather
1 year, 11 months agofb2fcb1
1 year, 11 months ago