Weekend Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ac4s65

You are responding to an incident involving a Windows server on your company’s network.

You are responding to an incident involving a Windows server on your company’s network. During the investigation you notice that the system downloaded and installed two files, iexplorer.exe and iexplorer.sys. Based on the behavior of the system you suspect that these files are part of a rootkit. If this is the case what is the likely purpose of the .sys file?

A.

It is a configuration file used to open a backdoor

B.

It is a logfile used to collect usernames and passwords

C.

It is a device driver used to load the rootkit

D.

It is an executable used to configure a keylogger

GCED PDF/Engine
  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions
buy now GCED pdf
Get 65% Discount on All Products, Use Coupon: "ac4s65"