DavidHarris6650 DavidHarris6650
  • 07-06-2017
  • Computers and Technology
contestada

An is auditor reviewing a network log discovers that an employee ran elevated commands on his/her pc by invoking the task scheduler to launch restricted applications. this is an example what type of attack?

Respuesta :

peterdaly
peterdaly peterdaly
  • 20-06-2017
I would say a cyber attack.since it is any kind of offensive act on a computer system including pc's that steals, alters or destroys confidential information and which is considered hacking a computer. Using the task scheduler to launch restrictive applications seems to qualify as such an attack since it is violating the restrictive applicatios.
Answer Link

Otras preguntas

100 equals 15 minus x divided by 5
What statements is true
Susan has been working tirelessly for the past few weeks due to tight deadlines. she is also being pressurized by her parents to get married and settle in life.
if there are 2.54cm in an inch , how many inches are in 14.8cm?
Which of these would you associate with obesity? Select the two correct answers. A Lower than average height for a given weight b. Greater than average height
If a school bus stops to unload children on a divided highway with a dividing barrier, vehicles traveling in the opposite direction
Which statement is true about the expression 12-7+3
Really need help with this question, and soon. If you help me out thank you so so much before hand :)
What did Hawaii have to do with US plans involving Asia?
Diamonds that are mined by force and sold in the black market called what?