1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faust18 [17]
3 years ago
10

An is auditor reviewing a network log discovers that an employee ran elevated commands on his/her pc by invoking the task schedu

ler to launch restricted applications. this is an example what type of attack?
Computers and Technology
1 answer:
yarga [219]3 years ago
5 0
<span>I would say a cyber attack.since it is any kind of offensive act on a computer system including pc's that steals, alters or destroys confidential information and which is considered hacking a computer. Using the task scheduler to launch restrictive applications seems to qualify as such an attack since it is violating the restrictive applicatios.</span>
You might be interested in
How do you answer a question on here
Monica [59]
Didn’t you just make a question right now?
4 0
3 years ago
Read 2 more answers
Write a script that creates a user-defined database role named paymententry in the ap database. give update permission to the ne
Kazeer [188]

Answer:

USE AP CREATE ROLE PaymentEntry

GRANT UPDATE, DELETE ON Invoices TO PaymentEntry

GRANT UPDATE, INSERT ON InvoiceLineItems TO PaymentEntry

EXEC sp_AddRoleMember db_datareader, PaymentEntry

7 0
3 years ago
State why hexadecimal is used to display the error code
maxonik [38]
“Hexadecimal uses digits that more closely resemble our usual base-10 counting system and it's therefore easier to decide at a glance how big a number like e7 is as opposed to 11100111. Higher information density. With 2 hexadecimal digits, we can express any number from 0 to 255.”
7 0
4 years ago
Write a SELECT statement that returns the category_name column from the Categories table. Return one row for each category that
KengaRu [80]

Answer:

Below is the required statement:

Explanation:

select c.categoryname

from categories c

where not exists (select 1 from products p where p.categoryid = c.categoryid);

6 0
3 years ago
16. The process of using a computer to write, design, and assemble documents is called
julia-pushkina [17]
It is called D. destkop pulishing
With desktop publishing, people will had the options to choose a certain layout from the destkop publishing software that allow them to create high quality document in shorter period of time. This software allow individuals to publish on their own without the need of printing press.
3 0
3 years ago
Read 2 more answers
Other questions:
  • What was the second phone made in the world called?
    5·1 answer
  • Employees don't have to comply with PPE requirements if they feel the PPE isn't necessary for the particular task they performed
    14·2 answers
  • Linda is training to become a certified network design expert and consultant. While researching about the process of cellular ra
    12·1 answer
  • Create a Trip class. Include as data members destination, distance traveled, total cost of gasoline, and number of gallons consu
    14·1 answer
  • You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directl
    5·1 answer
  • Explain the history of computing device of mechanical era
    7·1 answer
  • Does anyone know the answer for question d (questions in the picture btw)
    7·1 answer
  • What is the size of BIOS?
    13·2 answers
  • Where does blood travel when it leaves the right ventricle of the heart
    11·2 answers
  • Pls paanswer asap......​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!