GIAC GCIH Question Answer
Which of the following rootkits is used to attack against full disk encryption systems?
Boot loader rootkit
Library rootkit
Hypervisor rootkit
Kernel level rootkit
TESTED 12 Jul 2025
Copyright © 2014-2025 ACE4Sure. All Rights Reserved