Exam GCIH All QuestionsBrowse all questions from this exam
Question 40

Which of the following Linux rootkits allows an attacker to hide files, processes, and network connections?

Each correct answer represents a complete solution. (Choose all that apply.)

    Correct Answer: A, B

    Phalanx2 and Beastkit are both known Linux rootkits that allow an attacker to hide files, processes, and network connections. Phalanx2 is a userland rootkit capable of hiding processes and files, while Beastkit offers similar functionalities and is known for its stealth and sophistication. Both of these tools are designed to mask the presence of the attacker on a compromised system. This makes them the correct answers for this question.

Discussion
tp9222Options: AB

ANS : ALL Phalanx2 https://www.oreilly.com/library/view/the-art-of/9781118824993/c27.xhtml Adore https://topic.alibabacloud.com/a/adore-rootkit-analysis_8_8_32021827.html Knark https://docs.ospatrol.com/en/latest/rootcheck/rootcheck-knark.html Beastkit: Beastkit is another Linux kernel rootkit known for its stealth and sophistication. It provides attackers with the ability to hide files, processes, and network connections on a compromised system.