ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 16 Topic 2 Discussion

ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 16 Topic 2 Discussion

EC0-350 Exam Topic 2 Question 16 Discussion:
Question #: 16
Topic #: 2

What file system vulnerability does the following command take advantage of?

type c:\anyfile.exe > c:\winnt\system32\calc.exe:anyfile.exe


A.

HFS


B.

Backdoor access


C.

XFS


D.

ADS


Get Premium EC0-350 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.