nerdexam
Palo_Alto_NetworksPalo_Alto_Networks

PCCET · Question #206

PCCET Question #206: Real Exam Question with Answer & Explanation

The correct answer is B: It cannot be detected by antivirus because of its masking techniques.. Rootkits are defined by two core traits: they embed themselves into the operating system (C), gaining privileged control at the kernel or system level, and they use stealth/masking techniques (B) to hide their presence from antivirus software, security tools, and even the OS itse

Submitted by jakub_pl· Apr 18, 2026Cybersecurity Foundations

Question

What are the two most prominent characteristics of the malware type rootkit? (Choose two.)

Options

  • AIt encrypts user data.
  • BIt cannot be detected by antivirus because of its masking techniques.
  • CIt takes control of the operating system.
  • DIt steals personal information.

Explanation

Rootkits are defined by two core traits: they embed themselves into the operating system (C), gaining privileged control at the kernel or system level, and they use stealth/masking techniques (B) to hide their presence from antivirus software, security tools, and even the OS itself - making them particularly dangerous and persistent.

Options A and D describe behaviors associated with other malware types: encryption of user data is the hallmark of ransomware, while stealing personal information is characteristic of spyware or trojans. Rootkits can be bundled with such functionality, but those aren't their defining traits.

Memory tip: Think of the word "root" - rootkits go for root/admin access (OS control) and then dig in and hide like roots underground (masking). Root = control + concealment.

Topics

#Rootkit#Malware characteristics#Operating System Control#Malware evasion

Community Discussion

No community discussion yet for this question.

Full PCCET PracticeBrowse All PCCET Questions