Types of Attacks Preceding Rootkit Installation | SY0-601 CompTIA Security+ Exam Answer

Types of Attacks Preceding Rootkit Installation

Prev Question Next Question

Question

Which of the following types of attacks precedes the installation of a rootkit on a server?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

C.

The correct answer is C. Privilege escalation.

A rootkit is a type of malware that provides remote access and administrative control over a compromised system without being detected by system administrators or security software. Attackers use rootkits to install backdoors, steal sensitive information, and carry out further attacks on the system.

Privilege escalation is the process of gaining higher levels of access to a system or resource than authorized. Attackers use privilege escalation attacks to elevate their privileges to gain administrative access and install rootkits on the targeted server.

The attackers may use various techniques to carry out a privilege escalation attack, such as exploiting vulnerabilities in software, stealing passwords, or tricking users into running malicious code.

Pharming is a type of attack that redirects website traffic to a fake website that looks identical to the legitimate one. This attack does not directly lead to the installation of a rootkit on a server.

DDoS (Distributed Denial of Service) and DoS (Denial of Service) are types of attacks that overload a server or network with traffic, causing it to become unavailable. These attacks may be used as a distraction technique to divert attention while the attacker carries out other attacks, but they do not directly lead to the installation of a rootkit on a server.