1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faust18 [17]
3 years ago
10

An is auditor reviewing a network log discovers that an employee ran elevated commands on his/her pc by invoking the task schedu

ler to launch restricted applications. this is an example what type of attack?
Computers and Technology
1 answer:
yarga [219]3 years ago
5 0
<span>I would say a cyber attack.since it is any kind of offensive act on a computer system including pc's that steals, alters or destroys confidential information and which is considered hacking a computer. Using the task scheduler to launch restrictive applications seems to qualify as such an attack since it is violating the restrictive applicatios.</span>
You might be interested in
The 6 steps for PowerPoint competency from the TED talk in the module "How to Avoid Death by PowerPoint."?
KIM [24]

Answer:

1. Do some presentation preparation work

2. Set the right tone and end on a high note.

3. Create sleek and stylish slides.

4. Get your audience to focus.

5. Its all about you.

Explanation:

1. Do some presentation preparation work:

A good presentation begins, not with slides, but with a pencil and paper. Research your audience’s background, interests and capabilities. What do they already know, for instance, and what can they learn from you?

2. Set the right tone and end on a high note:

You have no more than 30 seconds to secure your audience’s attention. So, what attention-grabbing opener will you use?

Visual communications expert Curtis Newbold suggests “a fascinating quote; an alarming or surprising statistic; asking your audience a question; telling a relevant and funny joke… an imaginary scenario; or a demonstration''.

3. Create sleek and stylish slides:

Once you have your story down, you can start to design your slides.  

Before you do, it’s important to think about the practicalities. Will they, for instance, be displayed Widescreen with a 16:9 ratio? Or Standard with 4:3? This might seem like a small detail, but it can make a huge difference in terms of visual impact.

4.  Get your audience to focus:

The most important thing is to grab your audience’s attention straight away – and then maintain it! You want your audience to go away having learned something. So, make it as easy as possible for people to grasp your message “from the off”!

5.  Its all about you:

Finally, remember that, ultimately, it’s you that the audience should be paying attention to, not your slides!

PowerPoint can be used to create great visual aids, but the success of your presentation is determined by the way you deliver them. So, tell your story with a confident, compelling physical presence, and master it by rehearsing it 10 to 15 times.

6 0
3 years ago
Which of the following is true about STEM education? STEM education is focused on understanding rather than applying scientific
Soloha48 [4]

Answer:

C). STEM students are encouraged to blend and expand their knowledge of all four subject areas.

Explanation:

STEM education is characterized as a learning and development approach that focuses upon an amalgamation of four subject areas including science(S), technology(T), engineering(E), and Mathematics(M). Thus, each letter stands for a subject domain and this integration of four subjects primarily aims to 'blend and expand the knowledge of the students in these areas' integratively. It helps in developing and sustaining the interests of young learners through this integrated approach which also assists them with unique opportunities. Thus, <u>option C</u> is the correct answer.

5 0
3 years ago
Which of the following are advantages of cloud computing?
Leona [35]
Hahahahaha lawllakad
7 0
3 years ago
Read 2 more answers
You have decided to install the DNS server role on Nano Server. What specific type of zone configuration is not supported when u
nadya68 [22]

Answer:Active Directory-integrated

Explanation: Active Directory-integrated is the service that is introduced by the Microsoft .This service provides the directory form for functioning in Windows. It serves the purpose of active directory(AD) transferring to the Dynamic web database. Whenever the user gets connected to any website, it provides validation to qualifications . So, it does not get support the specification when there is working of DNS.

4 0
3 years ago
HELP WILL MARK BRAINLIEST!!!!!!!!!!!!!!!!!<br> How do you take a screenshot on Windows 7?
Alina [70]
U can see the printscr botton at the top right of ur keyboard and then u can type paint and the control v. 
3 0
3 years ago
Read 2 more answers
Other questions:
  • If you wanted to only view the sales of $200,000+ in the table above, which number filter would you select?
    7·1 answer
  • When you make a pointer variable im C++, is star label a must?
    9·1 answer
  • When powering off your computer is best down using?
    8·2 answers
  • When we focus on stereotypes we may ___________________. a. experience culture shock b. develop ethnocentrism c. unconciously lo
    8·2 answers
  • How is a ink pen better than a digital pen.
    8·1 answer
  • Which of these is the proper flow for an Auto Trans cooling system?
    7·2 answers
  • PLEASE HELP FAST !!!!!!!!!!
    12·1 answer
  • Phil wants to make a dark themed superhero movie. What could be his target demographic
    11·2 answers
  • What is Microsoft marketing ?
    10·1 answer
  • Dyn is a cloud-based internet performance management company that provides DNS services for internet websites. It was attacked w
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!