GIAC GCIH Question Answer
Which of the following rootkits is used to attack against full disk encryption systems?
Boot loader rootkit
Library rootkit
Hypervisor rootkit
Kernel level rootkit
TESTED 11 Jan 2026
Copyright © 2014-2026 ACE4Sure. All Rights Reserved