A security analyst has concerns about malware on an endpoint. The malware is unable to detonate by modifying the kernel response to various system calls. As a test, the analyst modifies a Windows server to respond to system calls as if it was a Linux server. In another test, the analyst modifies the operating system to prevent the malware from identifying target files. Which of the following techniques is the analyst MOST likely using?
Amin4799
Highly Voted 2 years, 1 month agodeeden
Most Recent 4 months, 3 weeks ago881cfb8
5 months agoBright07
5 months agorice3cooker
7 months, 3 weeks agoEAlonso
9 months, 3 weeks agorice3cooker
10 months agoSangSang
10 months, 3 weeks agoe020fdc
1 year, 2 months agoAnarckii
1 year, 4 months agoAnarckii
1 year, 4 months agoAnarckii
1 year, 4 months agonuel_12
1 year, 5 months agohheerreessjjoohhnnyy
1 year, 6 months agoPOWNED
1 year, 7 months agoMeep123
1 year, 7 months agoMeep123
1 year, 7 months agoimather
1 year, 9 months agofb2fcb1
1 year, 9 months ago