Cybersecurity Ethical Hacking Fill_blanks
Oct 16, 2025

The ________ technique involves hiding malicious code within legitimate processes.

Fill in the blanks:

The process injection technique involves hiding malicious code within legitimate processes.

Answers: 1. process injection 2. code injection 3. DLL injection 4. hollowing
Detailed Explanation
Process injection techniques hide malicious code within legitimate processes to evade detection and maintain persistence.
Discussion (0)

No comments yet. Be the first to share your thoughts!

Share Your Thoughts
Feedback