Posted by: Pdfprep
Post Date: December 14, 2020
What is the best source of data for analysis of a system that is potentially compromised by a rootkit?
A . checking for running processes using command line tools on the system
B . using static binaries in a trusted toolset imported to the machine to check running processes
C . reviewing active network connections with netstat or nbtstat
D . taking a forensic image of the machine
Answer: D
Leave a Reply