Which technique is used to hide malicious files and activities using rootkits and steganography?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which technique is used to hide malicious files and activities using rootkits and steganography?

Explanation:
Concealing artifacts on a system is the idea here. Rootkits are designed to hide their presence by altering how the OS reports files, processes, and activity, so tools that normally reveal them fail to see what’s there. Steganography hides data by embedding it inside ordinary-looking files, like images or audio, so the malicious payload isn’t obvious even if someone inspects the file. When both techniques are used, the goal is to keep malicious files and actions out of sight, which is precisely what hiding files describes. In contrast, covering tracks focuses on erasing forensic traces, escalating privileges is about gaining higher access, and password cracking targets credentials rather than concealment.

Concealing artifacts on a system is the idea here. Rootkits are designed to hide their presence by altering how the OS reports files, processes, and activity, so tools that normally reveal them fail to see what’s there. Steganography hides data by embedding it inside ordinary-looking files, like images or audio, so the malicious payload isn’t obvious even if someone inspects the file. When both techniques are used, the goal is to keep malicious files and actions out of sight, which is precisely what hiding files describes. In contrast, covering tracks focuses on erasing forensic traces, escalating privileges is about gaining higher access, and password cracking targets credentials rather than concealment.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy