1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guapka [62]
1 year ago
9

By compromising a Windows XP application that ran on a Windows 10 machine, an attacker installed persistent malware on a victim

computer with local administrator privileges. What should the attacker add to the registry, along with its files added to the system folder, to execute this malware?
Computers and Technology
1 answer:
777dan777 [17]1 year ago
7 0

The thing that the  attacker add to the registry, along with its files added to the system folder, to execute this malware is known to be a shim.

<h3>What does shim mean in computing?</h3>

A shim is known to be a piece of code that is said to be used to change for better the behavior of code that is said to often exists, and this is often done by adding new API that functions around the problem.

Note that this is not the same like a polyfill, that implements a new API and as such, The thing that the  attacker add to the registry, along with its files added to the system folder, to execute this malware is known to be a shim.

Learn more about malware  from

brainly.com/question/399317

#SPJ1

You might be interested in
How many total bits are required for a direct-mapped cache with 128 blocks and a block size of 8 bytes, assuming a 4GB main memo
Marysya12 [62]

Answer:

32

Explanation:

Total bits will be 32 only as address is of 32 bits

(meaning to ask the size of the cache)

7 0
3 years ago
The ___________ method returns the length of an array.
MaRussiya [10]

Answer:

A. Append

Explanation:

4 0
3 years ago
Read 2 more answers
Convert<br> 0.625 to binary
Anastaziya [24]

\huge{ \rm{Question:}}

Convert

0.625 to binary

\huge{ \rm{Answer:}}

Translate 0.625 into a fraction. We all know that 0.5 is ½. We know that the remainder, 0.125, is ⅛. Add them together, and you get ½ + ⅛ = ⅝.

Now, in binary, the positions to the right of the point are , which is ½, ¼, and ⅛ respectively.

⅝ is 5 × ⅛. 5 in binary is 101. So, ⅝ is

= 0.101

8 0
2 years ago
To decrease the size of text so it will fit into a text box without overflowing, select the
Trava [24]

Answer:

It is is A

Explanation:

Becuase if you shrink a text thats just the answer

5 0
3 years ago
Read 2 more answers
Which is a common problem caused by the widespread use of computers?
Andru [333]
Hacking would be a widespread problem.
8 0
4 years ago
Other questions:
  • A disk rotates at a rate of 7200 revolutions per minute. Seek operations (i.e., moving the access head to a desired track) take
    6·1 answer
  • Technician A says that in any circuit, electrical current takes the path of least resistance. Technician B says that while this
    11·2 answers
  • Populate a one-dimensional array with the following grades in this order: 90, 61, 74, 42, 83, 51, 71, 83, 98, 87, 94, 68, 44, an
    15·1 answer
  • Geobubble Chart (2D) displaying Robot Density Per 10,000 Employees for the specified countries;
    7·1 answer
  • What is an IP address and where I can find the IP address for my computer?
    14·1 answer
  • Among the following, which is the best protection against ransomware?
    8·1 answer
  • Once the CPU has fetched the data requested, what are the next steps in the process?
    15·1 answer
  • takes the perspective that a program describes what the solution to a problem is, not how that problem is solved. Select one: a.
    5·1 answer
  • ________ is the use of information technology to support the sharing of content among networks of users.
    14·1 answer
  • Write an expression in Boolean algebra that evaluates to 1 when an odd number of bits of the number is 1 and 0 otherwise
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!