Which technique is used to hide malicious files and activities using rootkits and steganography?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which technique is used to hide malicious files and activities using rootkits and steganography?

Explanation:
Concealing artifacts on a system is the idea here. Rootkits are designed to hide their presence by altering how the OS reports files, processes, and activity, so tools that normally reveal them fail to see what’s there. Steganography hides data by embedding it inside ordinary-looking files, like images or audio, so the malicious payload isn’t obvious even if someone inspects the file. When both techniques are used, the goal is to keep malicious files and actions out of sight, which is precisely what hiding files describes. In contrast, covering tracks focuses on erasing forensic traces, escalating privileges is about gaining higher access, and password cracking targets credentials rather than concealment.

Concealing artifacts on a system is the idea here. Rootkits are designed to hide their presence by altering how the OS reports files, processes, and activity, so tools that normally reveal them fail to see what’s there. Steganography hides data by embedding it inside ordinary-looking files, like images or audio, so the malicious payload isn’t obvious even if someone inspects the file. When both techniques are used, the goal is to keep malicious files and actions out of sight, which is precisely what hiding files describes. In contrast, covering tracks focuses on erasing forensic traces, escalating privileges is about gaining higher access, and password cracking targets credentials rather than concealment.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy