1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Usimov [2.4K]
4 years ago
15

A security administrator is reviewing the following PowerShell script referenced in the Task Scheduler on a database server: Whi

ch of the following did the security administrator discover?
A. Ransomeware
B. Backdoor
C. Logic bomb
D. Trojan Hide Solution Discussion
Computers and Technology
1 answer:
Artemon [7]4 years ago
7 0

Answer:

Logic Bomb.

Explanation:

A logic bomb is a piece of code that is malicious and is used to cause harm to a network when the conditions in the programs are met.

So, while reviewing the power shell script referenced in the Task Scheduler on a database server the administrator found logic bomb in the script.

Hence the answer is option c.

You might be interested in
Heeeeeeeelp :)<br> thx<br> jfdyiusjmkdsuiho;dmcvrvho;j
anastassius [24]

Answer:

I think option C is correct

7 0
3 years ago
Read 2 more answers
To close a window in Windows 10, you can _____. Select all that apply. A. right-click its button on the taskbar, then click Clos
Nookie1986 [14]

Answer:

A, B and C

Explanation:

A, B and C

(The following is unrelated to the answer just to fill the letters criteria)

3 0
4 years ago
To indent the first line of a paragraph which key should you use
JulijaS [17]
You need to press the spacebar
3 0
4 years ago
Read 2 more answers
Which computers were the first PCs with a GUI<br> MS-DOS <br> Linux<br> Windows<br> Mac
sergeinik [125]

Answer:

The first computer with a GUI were linux, microsoft and apple.

Explanation:

I think this is right. Hope it helped <3

8 0
3 years ago
Read 2 more answers
How many keys are utilized in symmetric cryptography?A. OneB. TwoC. ThreeD. Four
eimsori [14]

Answer:

A. One

Explanation:

Symmetric key cryptography makes use of one key. The same key is used for both encryption and decryption. This is different from asymmetric cryptography where separate keys are used for the two operations. Some examples of symmetric cryptography include:

  • Advanced Encryption Standard (AES)
  • Data Encryption Standard (DES)
  • Triple Data Encryption Standard (3DES)
  • Blowfish
7 0
3 years ago
Other questions:
  • When your Windows XP file becomes too large to fit in a single window, which of these components allows you to bring different p
    6·1 answer
  • You are the project manger for Xylophone Phonics. It produces children's software programs that teach basic reading and math ski
    11·1 answer
  • How can you get access to Help? Click all that apply.
    5·2 answers
  • Sam would like to install a new application on every computer in his SOHO network. All the computers are currently connected in
    15·1 answer
  • On an XBOX 360, what does it mean if you get 4 red rings on your console?
    5·1 answer
  • 4. Write technical term for the following statements
    15·2 answers
  • Prove that: P = hdg​
    7·2 answers
  • I'm working on an assignment for my computer science class (Edhesive) and when I run the code, there are no errors. But when I t
    11·1 answer
  • Can someone please help me with this ,it is my assignment of technology and agriculture year 8
    5·1 answer
  • Put these numbers in order from smallest to largest:<br> 1. 00101112<br> 2. 011110<br> 3. 011110112
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!