A security analyst has concerns about malware on an endpoint. The malware is unable to detonate by modifying the kernel response to various system calls. As a test, the analyst modifies a Windows server to respond to system calls as if it was a Linux server. In another test, the analyst modifies the operating system to prevent the malware from identifying target files. Which of the following techniques is the analyst MOST likely using?
Amin4799
Highly Voted 1 year, 9 months agodeeden
Most Recent 1 month ago881cfb8
1 month agoBright07
1 month, 1 week agorice3cooker
3 months, 3 weeks agoEAlonso
6 months agorice3cooker
6 months agoSangSang
7 months agoe020fdc
11 months agoAnarckii
1 year agoAnarckii
1 year agoAnarckii
1 year agonuel_12
1 year, 1 month agohheerreessjjoohhnnyy
1 year, 3 months agoPOWNED
1 year, 3 months agoMeep123
1 year, 3 months agoMeep123
1 year, 3 months agoimather
1 year, 5 months agofb2fcb1
1 year, 6 months ago