1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guapka [62]
1 year ago
9

By compromising a Windows XP application that ran on a Windows 10 machine, an attacker installed persistent malware on a victim

computer with local administrator privileges. What should the attacker add to the registry, along with its files added to the system folder, to execute this malware?
Computers and Technology
1 answer:
777dan777 [17]1 year ago
7 0

The thing that the  attacker add to the registry, along with its files added to the system folder, to execute this malware is known to be a shim.

<h3>What does shim mean in computing?</h3>

A shim is known to be a piece of code that is said to be used to change for better the behavior of code that is said to often exists, and this is often done by adding new API that functions around the problem.

Note that this is not the same like a polyfill, that implements a new API and as such, The thing that the  attacker add to the registry, along with its files added to the system folder, to execute this malware is known to be a shim.

Learn more about malware  from

brainly.com/question/399317

#SPJ1

You might be interested in
Characteristics of first generation computers​
Marrrta [24]
* Main Electron a component- vacuum tube.

* Main memory- Magnetic drums and magnetic tapes.

* Programming language- Machine language.

* Power- Consume a lot of electricity and generate a lot of heat.

* were expensive to operate
5 0
3 years ago
Which type of cables are used for high-capacity trunk lines that provide main routes for telephone, cable, and internet communic
Naily [24]

Answer:

Fiber-optic cable

Explanation:

Before the cable industry transitioned to fiber-optic cables, for many years, the standard cables used for telephone, cable, and internet communications were coaxial cables. The transition was made possible because the architecture of the fiber-optic cable came with a higher capacity, more extensive bandwidth link. Unlike the coaxial or the twisted pair cable, the fiber-optic is made from glass strands that transmit light signals much quicker and to greater distances. This makes fiber-optic cables the fastest high capacity data transfer link than any other cables to ever exist.

3 0
3 years ago
Fiona is creating a presentation with PowerPoint Online about how pencils are made. She would like to type an explanation about
777dan777 [17]

Answer:THE ANSWER IS A.

Explanation:I DID IT AND I GOT 100

6 0
2 years ago
Write five importanceof saving a file.​
olga nikolaevna [1]

Explanation:

number 1 it will be safe for future use number 2 it helps in our rest of the work

number 3 saving a file is a very good habit number for importance of saving file are a very very nice number 5 I hope it help please give me your ratings and like and also don't forget to read the brainly.com

8 0
2 years ago
To use AutoSum with a row of four values, where must your cursor be to have the sum appear in the row if you have not highlighte
yan [13]

Answer:

on the first empty cell to the right of the last cell containing a value.

Explanation:

The AutoSum function in excel gives a shortcut path to taking the sum of numeric values in a row or column of data. The Autosum uses the sum function to take the addition of all the desired rows or columns values without needing to make a manual highlight of the data. To use AutoSum with a row of 4 values, the cursor must be placed immediately at the cell next 4th row cell containing a value. This is equivalent to the first empty cell to the right of the last cell containing a value, then autosum is clicked in the home tab and all 4 cells will be highlighted as it uses the sum function to calculate the sun of the 4 row values.

5 0
2 years ago
Other questions:
  • Gathering information with your eyes is called
    13·2 answers
  • Using the Invert Selection tool while something is selected in Paint will __________.
    14·1 answer
  • How to determine if the function f(x) = x^2 + 3 from real numbers to real numbers is Injective, surjective, or bijective
    13·1 answer
  • What can u access various sites on
    12·1 answer
  • Mengapakah wanita hamil memerlukan jumlah nutrien yang lebih banyak berbanding wanita tidak hamil.
    10·1 answer
  • Int a=10 int b=20<br> A=b<br> The new values for a and b are
    11·2 answers
  • Dang was accepted to a biology program with a rigorous schedule and a high tuition, but good professors. What would be a benefit
    10·2 answers
  • Each of the outcomes listed below is a result of executing the following script except for one. Which one? CREATE ROLE ExampleRo
    6·1 answer
  • Write a method that returns a version of the given array where all the 10's have been removed. The remaining elements should shi
    9·1 answer
  • An alternative to configuring individual workstations is to establish configurations dynamically when the computers connect to t
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!