ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 12 Topic 2 Discussion

ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 12 Topic 2 Discussion

EC0-350 Exam Topic 2 Question 12 Discussion:
Question #: 12
Topic #: 2

Attacking well-known system defaults is one of the most common hacker attacks. Most software is shipped with a default configuration that makes it easy to install and setup the application. You should change the default settings to secure the system.

Which of the following is NOT an example of default installation?


A.

Many systems come with default user accounts with well-known passwords that administrators forget to change


B.

Often, the default location of installation files can be exploited which allows a hacker to retrieve a file from the system


C.

Many software packages come with "samples" that can be exploited, such as the sample programs on IIS web services


D.

Enabling firewall and anti-virus software on the local system


Get Premium EC0-350 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.