GCIH Exam QuestionsBrowse all questions from this exam

GCIH Exam - Question 85


Which endpoint security bypass technique modifies the assembly of an executable?

Show Answer
Correct Answer: BD

Ghostwriting involves modifying the assembly of an executable to bypass endpoint security measures. This technique allows attackers to change the internal structure of the code without altering its external behavior, thus evading detection by security software.

Discussion

3 comments
Sign in to comment
Br1nOption: D
Dec 14, 2022

Correct answer should be D

sasdsOption: D
Jan 8, 2023

Ghostwriting - modifying the assembly of an executable in order to bypass

847ch0n3Option: D
Mar 3, 2024

Ghostwriting is correct.