Exam GCIH All QuestionsBrowse all questions from this exam
Question 85

Which endpoint security bypass technique modifies the assembly of an executable?

    Correct Answer: D

    Ghostwriting involves modifying the assembly of an executable to bypass endpoint security measures. This technique allows attackers to change the internal structure of the code without altering its external behavior, thus evading detection by security software.

Discussion
sasdsOption: D

Ghostwriting - modifying the assembly of an executable in order to bypass

Br1nOption: D

Correct answer should be D

847ch0n3Option: D

Ghostwriting is correct.