DavidHarris6650 DavidHarris6650
  • 07-06-2017
  • Computers and Technology
contestada

An is auditor reviewing a network log discovers that an employee ran elevated commands on his/her pc by invoking the task scheduler to launch restricted applications. this is an example what type of attack?

Respuesta :

peterdaly
peterdaly peterdaly
  • 20-06-2017
I would say a cyber attack.since it is any kind of offensive act on a computer system including pc's that steals, alters or destroys confidential information and which is considered hacking a computer. Using the task scheduler to launch restrictive applications seems to qualify as such an attack since it is violating the restrictive applicatios.
Answer Link

Otras preguntas

How many integers are there between -12 and 12?
The density of lead is 11.3g/ml. What is the volume in ml of 50.75g of lead?
The chart below shows the density of three different liquids. Which illustration correctly shows how these liquids would appear if they were poured slowly into
Based on The Riddle of the Rosetta Stone, how did the careers of Thomas Young and Jean-François Champollion differ? A. Champollion published ideas about his res
I need a lil help with this
What is the most important purpose of officials who serve at local levels of government? running for re-election providing services to people reorganizing count
hhhhhhhhhhhheeeeeeeelpppppp
Right answer gets brainlist
i) predict which of the liquids would cause the largest decrease in mass of potato stickPLEASE PLEASE HELP ME I HAVE 10 MINUTES ONLY, I WILL GIVE YOU THE BRAINL
What are the boys going to give boo radley and what caused them to stop their plans