(GREM) Giac Reverse Engineering Malware Practice Test
GREM - Giac Reverse Engineering Malware GREM GREM Rootkit & Anti-Forensics Analysis
What fundamentally distinguishes a kernel-mode rootkit from a user-mode rootkit?
Select your answer
A
Kernel-mode rootkits require administrator credentials while user-mode do not
B
Kernel-mode rootkits operate at CPU Ring 0 with unrestricted access, while user-mode rootkits operate at Ring 3
C
Kernel-mode rootkits only infect Linux systems
D
User-mode rootkits require physical hardware access to install
Hint