header bg

Scan QR code or get instant email to install app

Question:

Which of the following is capable of converting the machine's genuine operating system into the virtual machine?

A a Hypervisor-level rootkit
explanation

ECC describes a hypervisor-level rootkit as one that essentially replaces your actual operating system with a virtual one.

Comments

Leave a Reply

Your email address will not be published.

*