1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guapka [62]
1 year ago
9

By compromising a Windows XP application that ran on a Windows 10 machine, an attacker installed persistent malware on a victim

computer with local administrator privileges. What should the attacker add to the registry, along with its files added to the system folder, to execute this malware?
Computers and Technology
1 answer:
777dan777 [17]1 year ago
7 0

The thing that the  attacker add to the registry, along with its files added to the system folder, to execute this malware is known to be a shim.

<h3>What does shim mean in computing?</h3>

A shim is known to be a piece of code that is said to be used to change for better the behavior of code that is said to often exists, and this is often done by adding new API that functions around the problem.

Note that this is not the same like a polyfill, that implements a new API and as such, The thing that the  attacker add to the registry, along with its files added to the system folder, to execute this malware is known to be a shim.

Learn more about malware  from

brainly.com/question/399317

#SPJ1

You might be interested in
MoonieStardust Here is the rest of the picture from my last question you answered.
Oliga [24]

Answer:

the two on the bottom and the two on the top

Explanation:

move the two on the bottom apart and the two on the top inward

6 0
2 years ago
Read 2 more answers
Describe a sub routine​
Maksim231197 [3]

Explanation:

A routine or subroutine, also referred to as a function procedure and sub program is code called and executed anywhere in a program. FOr example a routine may be used to save a file or display the time.

4 0
2 years ago
Case Project 9-4: Troubleshoot an IP configurationYou work at a help desk and have just received a call from an employee who say
Svetllana [295]

Answer:

To get the IP address and other information on the workstation, type 'ipconfig' for windows or 'ifconfig' or Linux and press the return key.

The subnet mask is a class B type and 169.254.14.11 IP address shows that the workstation cannot access the DHCP server, so the IP address is not properly configured for network connection.

Explanation:

A computer network is an interconnection and intercommunication of two or more computer devices. All devices in a network must have an IP address, which can be static or dynamic from a DHCP server.

When a computer is configured to receive IP address from a DHCP server, but cannot reach the server, the IP address from the range of 169 is automatically assigned to it but still would not be able to communicate with other devices in the network.

4 0
2 years ago
After a failover cluster is created, which of the following is a task to be performed when configuring the failover cluster? (Ch
Lynna [10]

Answer: (B) Configure the cluster networks

               (C) Configure the quorum model

Explanation:

 When the fail-over cluster has been created then, configure the cluster network and quorum model tasks performed during configuring the fail-over cluster.

The quorum model are flexible in the window server. We can configure the quorum model when we need to modified the quorum model configuration for the cluster. The software cluster are automatically configure quorum model for the new cluster that is based on the availability of the share storage.

When configuring the fail-over cluster we can perform various cluster network tasks in the system.  

 

 

 

8 0
2 years ago
The stack ADT may be implemented with
Masteriza [31]

Answer: (c)All others answers

Explanation: Stack ADT is the group of the objects that are present  to work according to the last in first out strategy for the abstract data types. It works on the insertions and deletion of the elements that is referred as the push and pop action.

The ADT stacks can works with arrays, links list as well as vectors for the operation .Therefore, the correct option is option(c)

4 0
3 years ago
Other questions:
  • Which of the following best describes the purpose of child labor laws?
    13·2 answers
  • Hi Im really a girl and i want to know how to change my username without having to make a new account?
    9·2 answers
  • Your supervisor has asked you to set up a RAID hard drive array in a tower system, which has a motherboard that uses the B360 ch
    10·1 answer
  • There are a few simple rules that you can follow to store and manage files and folders in your computer. What is the most import
    9·2 answers
  • Ten members of a wedding party are lining up in a row for a photograph.
    8·1 answer
  • Which of the following statement is true for Service Request Floods A. An attacker or group of zombies attempts to exhaust serve
    11·1 answer
  • You are asked to provide a list of security groups a user is a member of. You write a script to pull the data from Active Direct
    11·1 answer
  • How many strings with five or more characters can be formed from the letters in seeress?
    15·1 answer
  • Is wireless or wired network faster??
    8·2 answers
  • What is the duty of WHH? (white hat hackers)<br><br><br>ANY WHH HERE?<br>​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!