DavidHarris6650 DavidHarris6650
  • 07-06-2017
  • Computers and Technology
contestada

An is auditor reviewing a network log discovers that an employee ran elevated commands on his/her pc by invoking the task scheduler to launch restricted applications. this is an example what type of attack?

Respuesta :

peterdaly
peterdaly peterdaly
  • 20-06-2017
I would say a cyber attack.since it is any kind of offensive act on a computer system including pc's that steals, alters or destroys confidential information and which is considered hacking a computer. Using the task scheduler to launch restrictive applications seems to qualify as such an attack since it is violating the restrictive applicatios.
Answer Link

Otras preguntas

A bag contains 1p, 2p, and 5p coins. 3/8 of the bag are 1p coins. There are as many 5p coins than 1p coins. There are 640 coins in total.
Let n be the smallest composite number such that it can be written as the product of two positive integers that differ by 10. How many distinct prime factors do
Please help answer ASAP
what are some common symptoms that patients expirence when affected by anxiety
15 POINTS PLEASE HELP
What are the ordered pairs of a line whose slope is 5, the y intercept is 3, the rise is 5, and the run is 1?
Written during the vietnam war, the revealed the federal government did not think the war could ever be won despite telling the public a different story for y
Identify an example of a lake that was formed by glacial processes.
under the articles of confederation, the federal government was given power to
Which power did farmers, merchants, and artisans eventually gain in the Roman republic? (1 point)