Question: You will use the volatility output text files located in the CYBV 4 0 0 network folder in your Virtual Learning Environment VM to answer
You will use the volatility output text files located in the CYBV network folder in your Virtual Learning Environment VM to answer this question.
The psxview module is useful for detecting rootkits able to evade detection by modifying flinks and blinks.
Review the psxview text file.
Locate the PID
Based on the results of psxview, select your assessment of PID from the list below.
Question options:
PID is the FTK Imager used to dump the memory from the subject computer. It is not a rootkit.
There is no expected entry of "false" in the pslist column. So it most likely isn't a rootkit.
Because it shows false in the csrss column, it is most likely a rootkit.
Because it shows true in both the pslist and psscan columns it is most likely a rootkit.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
