1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faust18 [17]
3 years ago
10

An is auditor reviewing a network log discovers that an employee ran elevated commands on his/her pc by invoking the task schedu

ler to launch restricted applications. this is an example what type of attack?
Computers and Technology
1 answer:
yarga [219]3 years ago
5 0
<span>I would say a cyber attack.since it is any kind of offensive act on a computer system including pc's that steals, alters or destroys confidential information and which is considered hacking a computer. Using the task scheduler to launch restrictive applications seems to qualify as such an attack since it is violating the restrictive applicatios.</span>
You might be interested in
Maxwell says three things Level Two Leaders do well are:
IRINA_888 [86]

Answer:

true

Explanation:

3 0
3 years ago
Please help <br> what do data communications transmit data through?
I am Lyosha [343]

Answer:There are two methods used to transmit data between digital devices: serial transmission and parallel transmission. Serial data transmission sends data bits one after another over a single channel. Parallel data transmission sends multiple data bits at the same time over multiple channels.

Explanation:

5 0
3 years ago
Which of the following is least likely to be a scientific experiment
Dennis_Churaev [7]

Answer:

what causes gravity to have a amount of force on one object but not another

Explanation:

3 0
3 years ago
Summarize the role of technology in efforts to explore space.
Georgia [21]
The role of technology in efforts to explore space could be argued to say that it has helped us to discover many different planets. An IS is a space station that helps us do stuff!!
6 0
3 years ago
Although it is not a term Excel uses, how do most people think of Excel?
kobusy [5.1K]

They think of it as a spreadsheet

5 0
2 years ago
Other questions:
  • Write algorithm to find (a+b)^2=(a+b)*(a+b)​
    9·1 answer
  • Identify a true statement about decision support systems (DSSs).
    15·1 answer
  • Technician A says that the first step in the diagnostic process is to verify the problem (concern). Technician B says that the s
    11·1 answer
  • What type of version of visual studio is the visual studio express
    8·1 answer
  • Code the function definition for aNonclassFunction, picking up co. aNonclassFunction has no return value.
    8·1 answer
  • A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
    9·1 answer
  • Write a programmer defined function that compares the ASCII sum of two strings. To compute the ASCII sum, you need to compute th
    6·1 answer
  • What is used to accurately position objects on the slide using a single horizontal and vertical line that intersects in the cent
    5·2 answers
  • Place the steps in order for creating a Custom Search Folder in Outlook 2016.
    9·2 answers
  • 1) Coding for Table in Html<br>​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!