B. Rootkit
Explanation:
Side loading refers to the process of installing applications or software from unofficial or untrusted sources, bypassing the standard security measures of an operating system or application store. During side loading, malicious software such as a rootkit can be introduced, which allows attackers to gain deep, hidden access to the system, often with administrative privileges. Rootkits can remain undetected for long periods, enabling further malicious activity.
Breakdown of the other options:
A. User impersonation: This typically occurs through credential theft or social engineering, not directly due to side loading.
C. On-path attack: An on-path attack (previously known as man-in-the-middle) involves intercepting communications, typically happening through network vulnerabilities, not side loading.
D. Buffer overflow: While a buffer overflow is a type of software vulnerability, it is not typically introduced directly through side loading; it typically arises from poor coding practices.
upvoted 2 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
test_arrow
1 day, 13 hours ago