A developer’s workstation slows dramatically, and logs reveal a process altering system binaries undetected by antivirus. What is the MOST likely threat, and what should be inspected?
Correct Answer: A rootkit; kernel modules.
Explanation: Rootkits modify system files stealthily, requiring kernel-level checks.
Correct Answer: A rootkit; kernel modules.
Explanation: Rootkits modify system files stealthily, requiring kernel-level checks.