1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guapka [62]
2 years ago
9

By compromising a Windows XP application that ran on a Windows 10 machine, an attacker installed persistent malware on a victim

computer with local administrator privileges. What should the attacker add to the registry, along with its files added to the system folder, to execute this malware?
Computers and Technology
1 answer:
777dan777 [17]2 years ago
7 0

The thing that the  attacker add to the registry, along with its files added to the system folder, to execute this malware is known to be a shim.

<h3>What does shim mean in computing?</h3>

A shim is known to be a piece of code that is said to be used to change for better the behavior of code that is said to often exists, and this is often done by adding new API that functions around the problem.

Note that this is not the same like a polyfill, that implements a new API and as such, The thing that the  attacker add to the registry, along with its files added to the system folder, to execute this malware is known to be a shim.

Learn more about malware  from

brainly.com/question/399317

#SPJ1

You might be interested in
Four examples of computer virus​
Nikitich [7]

Virus that infects files. Macro Virus is a virus that attaches itself to an executable application. This type of virus is commonly found in Microsoft Word or Excel programs.... Browser Hijacker.... Web Scripting Virus.

Good morning, I hope this helps, and if you don't mind, please mark me as brainliest ❤

4 0
3 years ago
An optimal solution to a linear programming problem MUST lie A. somewere on the line between two corner points. B. somewhere out
g100num [7]

Answer:

D. at the intersection of at least two constraints.

Explanation:

Linear programming is an optimization technique which is fine for the purpose of getting the best solution such as maximizing profit or certain o 4th era quantities. It is fine by modelling real life problems into mathematical models that have linear relationships or constraints such as in the form of objective functions. In linear programming, an objective function defines the formula for quantity optimization and the goal from this is to determine variable values that maximize or minimize the objective function depending on the problem robbery solved.

8 0
3 years ago
How many 1000-Watt lights can be plugged into a standard 120-Volt, 15-Amp outlet? (Hint: W/V=A) *
Licemer1 [7]

Answer:

There are up to 12 lights and or plugs on that circuit. A 1000w HPS or Metal Halide light takes 9 amps at 120 volts so you can only run one on a wall outlet circuit. A standard dryer outlet is 220 volts and 30 amps so you can power up to six 1000 watt lights on that circuit.

5 0
3 years ago
Give reasons why mind-mapping software is important to project development.
Shtirlitz [24]

Answer:

Explanation:Mind mapping software can help you to make connections and become a better creative problem solver.

...

It helps you to make better decisions. ...

It helps you to become better organized. ...

You can see the forest and the trees. ...

It helps you to identify, prioritize and track key project tasks.

7 0
3 years ago
Ano ang maikling kwento??
marishachu [46]

Answer with Explanation:

Ang "maikling kuwento" ay isang uri ng<em> kathang-isip</em> na may pagkapareho sa nobela. Ito'y may buong tema ngunit mas maikli kaysa sa nobela at mas madali rin itong matapos basahin. Hango ito sa mga tunay na pangyayari sa buhay ng tao. Binubuo ito ng limang elemento: <em>tauhan, tagpuan, hidwaan, tema at plot. </em>Ito'y may balak na pukawin ang damdamin ng nagbabasa ayon sa kalagayan ng mga tauhan sa kuwento at ito'y nag bibigay ng mabuting aral.

Si <em>Edgar Allan Poe</em> ang tinaguriang<em> "Ama ng Maikling Kuwento." </em>

3 0
3 years ago
Other questions:
  • When changing the formatting of a spreadsheet to make it more readable, you should use light blue text on a bright blue backgrou
    12·1 answer
  • You have just changed the system time within your computer's BIOS. You choose to save the settings upon exit. What happens next
    14·2 answers
  • Hi! I'm Kayla! I was wondering who does homework on the weekends... anybody?? I guess almost everyone, including me. Anyways, le
    13·2 answers
  • Which of the following is a strategy used to enhance communication in a presentation?
    14·1 answer
  • In general, smartphones do NOT hold as much personal information as tablets.
    11·1 answer
  • Describe the components of a CPU--the CU, ALU, and Cache--and explain how they interact to make the CPU function.
    13·1 answer
  • Define Indentation
    8·1 answer
  • Command create database in oracle database ::((
    8·1 answer
  • how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks
    10·1 answer
  • Ayuda pliz es para ya!!!!!<br> nesesito un codigo html que me muestre este texto
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!