EC

ethical hacking and countermeasures v8

878 Questions

You can start the exam to practice all questions related to this exam.

Question No. 1

More sophisticated IDSs look for common shellcode signatures. But even these systems can be bypassed, by using polymorphic shellcode. This is a technique common among virus writers ?it basically hides the true nature of the shellcode in different disguises.

How does a polymorphic shellcode work?

Choose the correct option from the given list.
01 / 878

0 Discussions

Trending Exams