Which of the following is a hive in the Windows registry?

a. HKEY_CLASSES_ROOT
B. HKEY_USERS_CLASSES
C. HEKY_CLASSES_USER
D. HKEY_ROOT_CLASSES

Answer: a. HKEY_CLASSES_ROOT

Computer Science & Information Technology

You might also like to view...

The change history includes the name of the person who made the each change, when the change was made, and ________

A) what history was changed B) what data was changed C) what file was changed D) what feature was changed

Computer Science & Information Technology

Dumpster diving, social engineering, and Internet searches are some of the activities that take place in the following step of the attacker's methodology

a. Reconnaissance b. Scanning and enumeration c. Gaining access d. Escalation of privilege

Computer Science & Information Technology