Match the following keys to their hive file

I. HKEY_CLASSES_ROOT A. Default
II. HKEY_USERS\.Default B. System
III. HKEY_LOCAL_MACHINE\SAM C. SAM
IV. HKEY_CURRENT_CONFIG D. Software


D A C B

Computer Science & Information Technology

You might also like to view...

An organization that needs to understand vulnerabilities and threats needs to perform a:

a. Penetration test b. Threat analysis c. Qualitative risk assessment d. Quantitative risk assessment

Computer Science & Information Technology

Routine procedures to ensure that everybody who accesses a system meets the company's guidelines for the assignment of trust are typically part of the ____ function.

A. system identity management B. network identity management C. user identity management D. automated identity management

Computer Science & Information Technology

Select the term below which names an HTML5 API that allows web page visitors to share their geographic location.

a. geodata b. web storage c. canvas d. geolocation

Computer Science & Information Technology

In the Sort dialog box, the Using box displays ________ as the default

Fill in the blank(s) with correct word

Computer Science & Information Technology