Which of the following Linux rootkits allows attackers to hide files, processes, and network connections?

Which of the following Linux rootkits allows attackers to hide files, processes, and network

connections?
Each correct answer represents a complete solution. Choose all that apply.

Which of the following Linux rootkits allows attackers to hide files, processes, and network

connections?
Each correct answer represents a complete solution. Choose all that apply.

A.
Phalanx2

B.
Adore

C.
Knark

D.
Beastkit

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *