Monday 8 May 2017

ECCouncil 312-50v8 Question Answer

What file system vulnerability does the following command take advantage of?
type c:\anyfile.exe > c:\winnt\system32\calc.exe:anyfile.exe


A. HFS
B. Backdoor access
C. XFS
D. ADS

Answer: D



In what stage of Virus life does a stealth virus gets activated with the user performing certain actions such as running an infected program?


A. Design
B. Elimination
C. Incorporation
D. Replication
E. Launch
F. Detection

Answer: E

No comments:

Post a Comment

Note: only a member of this blog may post a comment.