Which of the following is a hive in the Windows registry?
a. HKEY_CLASSES_ROOT
B. HKEY_USERS_CLASSES
C. HEKY_CLASSES_USER
D. HKEY_ROOT_CLASSES
Answer: a. HKEY_CLASSES_ROOT
Computer Science & Information Technology
You might also like to view...
The change history includes the name of the person who made the each change, when the change was made, and ________
A) what history was changed B) what data was changed C) what file was changed D) what feature was changed
Computer Science & Information Technology
Dumpster diving, social engineering, and Internet searches are some of the activities that take place in the following step of the attacker's methodology
a. Reconnaissance b. Scanning and enumeration c. Gaining access d. Escalation of privilege
Computer Science & Information Technology