What file system vulnerability does the following command take advantage of?
type c:\anyfile.exe > c:\winnt\system32\calc.exe:anyfile.exe
A. HFS
B. Backdoor access
C. XFS
D. ADS
Answer: D
In what stage of Virus life does a stealth virus gets activated with the user performing certain actions such as running an infected program?
A. Design
B. Elimination
C. Incorporation
D. Replication
E. Launch
F. Detection
Answer: E
No comments:
Post a Comment
Note: only a member of this blog may post a comment.