1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guapka [62]
2 years ago
9

By compromising a Windows XP application that ran on a Windows 10 machine, an attacker installed persistent malware on a victim

computer with local administrator privileges. What should the attacker add to the registry, along with its files added to the system folder, to execute this malware?
Computers and Technology
1 answer:
777dan777 [17]2 years ago
7 0

The thing that the  attacker add to the registry, along with its files added to the system folder, to execute this malware is known to be a shim.

<h3>What does shim mean in computing?</h3>

A shim is known to be a piece of code that is said to be used to change for better the behavior of code that is said to often exists, and this is often done by adding new API that functions around the problem.

Note that this is not the same like a polyfill, that implements a new API and as such, The thing that the  attacker add to the registry, along with its files added to the system folder, to execute this malware is known to be a shim.

Learn more about malware  from

brainly.com/question/399317

#SPJ1

You might be interested in
Assume that you are testing the Orders database introduced in Watt (2014) - Appendix C. Discuss the problems and possible conseq
madreJ [45]

Answer:

129 \frac{2}{?} 23.4. \div 164 \times 5y1 + . \\ .00487ggh

6 0
3 years ago
I have a DBA for keyboarding coming up and I am nervous. Any tips or pointers?
Gennadij [26K]
Don't be nervous... haha
3 0
3 years ago
Read 2 more answers
What is the base of a number system?
Vinvika [58]

A number base is the number of digits or combination of digits that a system of counting uses to represent number. The most commonly used number system is the decimal system, commonly known as base10.

6 0
3 years ago
5. What is the number one cause of accidents in the classroom, office, and home?
sp2606 [1]

Answer:

Lack of safety in technology and structures.

4 0
3 years ago
Network administration is concerned with which tasks?
Yuri [45]

A user hacking or looking up utter nonsense....sorry if it didn't help

3 0
4 years ago
Read 2 more answers
Other questions:
  • Using the SUM function allows a series of numbers to be 1. Multiplied 2. Subtracted 3 Added 4. Divided
    11·1 answer
  • Write a program that removes all spaces from the given input. Ex: If the input is: Hello my name is John. the output is: Hellomy
    11·1 answer
  • Create a script that creates a new local variable.<br>• Name: BETTY<br>Value: Holberton<br>​
    6·1 answer
  • A user calls you and says that when they try to connect to the internal website, they are prompted for authentication. The user
    14·1 answer
  • Rock, Paper, Scissors is a two-player game in which each player chooses one of three items. If both players choose the same item
    9·1 answer
  • Studies show people remember at least ___more information when the document they are seeing or reading contains visual elements
    9·1 answer
  • Burtex Inc. is an application development organization. Twenty five of its knowledgeable employees are retiring in the upcoming
    6·1 answer
  • How have productivity programs improved the professional lives of people? (check all that apply)
    8·2 answers
  • Use the drop-down menus to complete the statements about printing Contacts. When printing a single contact, go to File and then
    15·1 answer
  • When an instruction is sent to the CPU in a binary pattern, how does the CPU know what instruction the pattern means
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!