1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guapka [62]
2 years ago
9

By compromising a Windows XP application that ran on a Windows 10 machine, an attacker installed persistent malware on a victim

computer with local administrator privileges. What should the attacker add to the registry, along with its files added to the system folder, to execute this malware?
Computers and Technology
1 answer:
777dan777 [17]2 years ago
7 0

The thing that the  attacker add to the registry, along with its files added to the system folder, to execute this malware is known to be a shim.

<h3>What does shim mean in computing?</h3>

A shim is known to be a piece of code that is said to be used to change for better the behavior of code that is said to often exists, and this is often done by adding new API that functions around the problem.

Note that this is not the same like a polyfill, that implements a new API and as such, The thing that the  attacker add to the registry, along with its files added to the system folder, to execute this malware is known to be a shim.

Learn more about malware  from

brainly.com/question/399317

#SPJ1

You might be interested in
How does hardware differ from software
joja [24]

Answer:

hardware is a physical installation while software is onling and not a physical thing u can touch u know?

4 0
3 years ago
What types of storage can be used to access your data on another computer?
krok68 [10]

Cloud storage is a major option. There is also a USB stick (Memory Stick) and sometimes a hard drive. But, cloud storage is probably the best option because your info can be accessed from anywhere that had internet connections.

Hope this helps!

5 0
4 years ago
Read 2 more answers
Catastrophic injuries and illnesses account for two-thirds of total health care costs in the country of Gnut. The Gnuti governme
Vilka [71]

Answer:

In the country of Gnut

The universal health insurance program that is likely to better allow Gnuti citizens to smooth consumption is:

program Y that would pay only for catastrophic illnesses and injuries.

Explanation:

Program Y is a better option for Gnuti citizens to smooth consumption.  The reason is that catastrophic injuries and illnesses already account for two-thirds of the total health care costs in the country.  These injuries and illnesses cost more income variability to the citizens than other health care expenses.  With the government sponsoring program Y, the citizens will be insulated from consumption patterns caused by income variability.  Consumption smoothing creates the needed balance between spending and saving during the different life phases for the citizens of Gnut.

3 0
3 years ago
Which risk management framework does the organization of standardization publish
olga2289 [7]

Answer:

ISO 31000:2009 publishes principles and generic guidelines on risk management.

Explanation:

ISO 31000:2009 can be applied to any public, private or community company, organization, society or individual. Hence, ISO 31000:2009 is not particular to either business or area.

ISO 31000:2009 can be implemented during the period of an industry and to a broad variety of actions, including policies and judgments, guidance, methods, functions, plans, goods, services, and assets.

ISO 31000:2009 can be implemented to any type of danger, whatever its kind, whether possessing positive or negative outgrowths.

3 0
4 years ago
Absolute time would be most similar to :
Luda [366]
The absolute time would be most similar to a fact. It was theorised and in fact, approved by scientists as a scientific law which governs, according to Wikipedia, as a "<span>true and mathematical </span>time<span>, of itself, and from its own nature flows equably without regard to anything external, and by another name is called duration: relative, apparent and common </span><span>time."</span>
3 0
4 years ago
Other questions:
  • When you are notified that a user’s workstation or system is acting strangely and log files indicate system compromise, what is
    5·1 answer
  • Hich chip contains the information necessary to start the computer system?
    11·1 answer
  • What is diffie-hellman most commonly used for?
    15·1 answer
  • Which would be a responsible use of technology used by victims of cyberbullying? finding ways to strike back at bullies online.
    15·1 answer
  • A USB is used for _________.[ pick the best answer that makes sense]
    14·2 answers
  • Give three reasons why Black hats hack?
    8·2 answers
  • It is where your cpu (processor) is installed
    10·2 answers
  • Ple Choice Worth 5 points)
    11·1 answer
  • New friends??? if you want to be my new friend go follow my gram
    7·2 answers
  • True or false: If you have a 32-bit CPU architecture, it's recommended to use a 64-bit operating system.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!