exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 243 discussion

Actual exam question from ISC's CISSP
Question #: 243
Topic #: 1
[All CISSP Questions]

Which of the following is the MOST effective measure for dealing with rootkit attacks?

  • A. Restoring the system from the last backup
  • B. Finding and replacing the altered binaries with legitimate ones
  • C. Turning off unauthorized services and rebooting the system
  • D. Reinstalling the system from trusted sources
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
RVoigt
7 months, 3 weeks ago
Selected Answer: D
From the CISSP Official Study guide - "Several rootkit-detection tools are available, some of which are able to remove known rootkits. However, once you suspect a rootkit is on a system, the only truly secure response is to reconstitute or replace the entire computer. Reconstitution involves performing a thorough storage sanitization operation on all storage devices on that system, reinstalling the OS and all applications from trusted original sources, and then restoring files from trusted rootkit-free backups. Obviously, the best protection against rootkits is defense (i.e., don't get infected in the first place) rather than response."
upvoted 2 times
jackdryan
3 months, 4 weeks ago
D is correct
upvoted 1 times
...
...
DJOEK
8 months ago
Selected Answer: D
Rootkits are malicious software programs that can hide themselves and other malware from detection on a computer system. They can be difficult to detect and remove, and often require a complete reinstallation of the system from trusted sources in order to completely eliminate the infection. This is considered the most effective measure for dealing with rootkit attacks, as it ensures that the entire system is clean and free from malware. Other options, such as restoring the system from a backup or finding and replacing altered binaries with legitimate ones may not completely remove the malware and might not guarantee a complete eradication of the rootkit.
upvoted 2 times
...
rdy4u
10 months, 2 weeks ago
Selected Answer: D
If antivirus software and a boot-time scan fail to remove the rootkit, try backing up your data, wiping your device, and performing a clean install. This is sometimes the only remedy when a rootkit is operating at the boot, firmware, or hypervisor level. https://www.avast.com/c-rootkit
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago