Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam GCIH topic 1 question 627 discussion

Actual exam question from GIAC's GCIH
Question #: 627
Topic #: 1
[All GCIH Questions]

Which endpoint security bypass technique modifies the assembly of an executable?

  • A. Living Off the Land
  • B. Code signing
  • C. Keyed payload
  • D. Ghostwriting
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
847ch0n3
2 months, 2 weeks ago
Selected Answer: D
Ghostwriting is correct.
upvoted 1 times
...
sasds
1 year, 4 months ago
Ghostwriting - modifying the assembly of an executable in order to bypass
upvoted 2 times
...
Br1n
1 year, 5 months ago
Correct answer should be D
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...