Section C — Technical deep-dive (2 questions × 15 marks = 30 marks) 9. Describe, at a technical level, how an activator might persist across reboots and attempts to remove it. Include filesystem, scheduled tasks/services, and boot-level techniques that could be used. (No exploit code; focus on mechanisms and indicators of compromise.) 10. Malware often hides in cracked activation packages. List the common types of payloads bundled with such tools, explain how each compromises a system, and specify two detection methods for each payload type.
Session expired
Please log in again. The login page will open in a new tab. After logging in you can close it and return to this page.