Which of the following Linux rootkits allows attackers to hide files, processes, and network
connections?
Each correct answer represents a complete solution. Choose all that apply.
A.
Phalanx2
B.
Adore
C.
Knark
D.
Beastkit
Explanation:
Which of the following Linux rootkits allows attackers to hide files, processes, and network
connections?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following Linux rootkits allows attackers to hide files, processes, and network
connections?
Each correct answer represents a complete solution. Choose all that apply.
A.
Phalanx2
B.
Adore
C.
Knark
D.
Beastkit
Explanation: