A security analyst has concerns about malware on an endpoint. The malware is unable to detonate by modifying the kernel response to various system calls. As a test, the analyst modifies a Windows server to respond to system calls as if it was a Linux server. In another test, the analyst modifies the operating system to prevent the malware from identifying target files. Which of the following techniques is the analyst MOST likely using?
Amin4799
Highly Voted 1 year agoe020fdc
Most Recent 2 months, 1 week agoAnarckii
4 months agoAnarckii
4 months, 1 week agoAnarckii
3 months, 4 weeks agonuel_12
5 months, 1 week agohheerreessjjoohhnnyy
6 months, 1 week agoPOWNED
6 months, 3 weeks agoMeep123
6 months, 3 weeks agoMeep123
6 months, 3 weeks agoimather
9 months agofb2fcb1
9 months, 2 weeks ago