Which detection technique compares runtime execution paths of all system processes and executable files before and after rootkit infection?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which detection technique compares runtime execution paths of all system processes and executable files before and after rootkit infection?

Explanation:
Detecting rootkits by monitoring how code actually runs and spotting deviations from a trusted baseline is a behavior-based approach. By capturing the runtime execution paths of all system processes and executables, you establish a baseline before any infection. After the rootkit appears, you re-check and compare the current paths to the baseline to identify anomalies—unexpected sequences, hidden processes, or altered system calls that suggest tampering. This focus on how programs execute, rather than on known signatures, makes it effective against rootkits that try to conceal themselves by changing control flow or hooking legitimate routines. The idea is to detect abnormal behavior, not just known malware patterns, which is why heuristic/behavior-based detection is the best fit here.

Detecting rootkits by monitoring how code actually runs and spotting deviations from a trusted baseline is a behavior-based approach. By capturing the runtime execution paths of all system processes and executables, you establish a baseline before any infection. After the rootkit appears, you re-check and compare the current paths to the baseline to identify anomalies—unexpected sequences, hidden processes, or altered system calls that suggest tampering. This focus on how programs execute, rather than on known signatures, makes it effective against rootkits that try to conceal themselves by changing control flow or hooking legitimate routines. The idea is to detect abnormal behavior, not just known malware patterns, which is why heuristic/behavior-based detection is the best fit here.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy