1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
max2010maxim [7]
4 years ago
8

An administrator has been working within an organization for over 10 years. He has moved between different IT divisions within t

he company and has retained privileges from each of the jobs that he's had during his tenure. Recently, supervisors admonished him for making unauthorized changes to systems. He once again made an unauthorized change that resulted in an unexpected outage and management decided to terminate his employment at the company. He came back to work the following day to clean out his desk and belongings, and during this time he installed a malicious script that was scheduled to run as a logic bomb on the first day of the following month. The script will change administrator passwords, delete files, and shut down over 100 servers in the datacenter. What could have discovered problems with this user's account while he was employed
Computers and Technology
1 answer:
rodikova [14]4 years ago
5 0

Answer:

User roles and access authorization

(Explanation of this question is given below in the explanation section.

Explanation:

As noted in question that a terminated employee comeback in office and installed some malicious script on a computer that was scheduled to run a logic bomb on the first day of the following month. And, that script will change administrator passwords, delete files, and shut down over 100 servers in the data center.

The following problem can be with that account

  • Unauthorized user access and privileges

The user may be given unauthorized access to system resources. If a user has unauthorized access to system resource then he can modify or destroy the system function easily.

  • The firewall may be disabled to detect the malicious script

The firewall should be enabled to detect such types of attack from unauthorized access to the system

  • Role

May be user role is not defined properly. If role would be defined according to user role then there are very fewer chances in doing unauthorized changes in the system that will result in an unexpected outage.

You might be interested in
You have a slicer and a chart on the same page for your sales data by state. If you use the menu to sort by territory in alphabe
tekilochka [14]

If a person is known to use the menu to sort by territory in alphabetical order, the effect will that have on the slicer and the chart is that The slicer will be sorted alphabetically.

<h3>What is meant by alphabetical order?</h3>

We  are known to be people who like to sort letters and words in a way that is alphabetical in nature.

This implies that one does this to order them as they are known to appear in the alphabet.

Hence, if sorting words in to alphabetical order, we often look at the first letter of the word and as such, If a person is known to use the menu to sort by territory in alphabetical order, the effect will that have on the slicer and the chart is that The slicer will be sorted alphabetically.

See full question below

You have a slicer and a chart on the same page for your sales data by state. If you use the menu to sort by territory in alphabetical order, what effect will that have on the slicer and the chart?

Select an answer:

Everything on the page will be sorted alphabetically by territory.

Only text items will be sorted alphabetically by territory, but chart items must be sorted separately.

The chart will be sorted alphabetically by territory, but the slicer will be unchanged.

The slicer will be sorted alphabetically by territory, but the chart will be unchanged.

Learn more about alphabetical order from

brainly.com/question/26971639

#SPJ1

6 0
2 years ago
C. There are two types of computer on the basis of size. true or false​
Veronika [31]

Answer:

False

Explanation:

Different factors, such as processing power, information processing, and the component (CPU) utilised in computers, are used to classify computers. Micro-computers, Mini-computers, Main-frame computers, and Super-computers are divided into four categories based on the components utilised and functionality of the computers.

4 0
3 years ago
De dónde proviene la mayoría de cosas que utilizamos en el hogar​
Mashutka [201]

Answer:

La mayoría de las cosas que utilizamos en el hogar proviene de distintas industrias ubicadas a lo largo y ancho del mundo, dado que vivimos en un mundo globalizado e industrializado, en el que las distintas naciones intercambian bienes y servicios a través del comercio internacional.

De esta manera, en los distintos hogares hay cosas de diversos orígenes, como electrodomésticos provenientes de China, Japón o los Estados Unidos, muebles provenientes de México o Suecia, alimentos provenientes de Argentina, etc.

7 0
3 years ago
Complete the expression so that user_points is assigned with 0 if user_items is greater than 25 (second branch). Otherwise, user
Tju [1.3M]
This a similar question but just that its greater then 30 seconds.
7 0
3 years ago
If you cause a car accident, which type of insurance will require you to pay the least out of pocket?
Svetlanka [38]
Low deductible plan is correct
4 0
3 years ago
Read 2 more answers
Other questions:
  • helppppp asap!!!!!!!!!! Sara has just started using the Internet. She would like to be a little more efficient. In 3–4 sentences
    9·2 answers
  • Which tool is used to create a basic web page using HTML?
    12·2 answers
  • Which of these files when included in a program will provide user assistance?
    13·2 answers
  • Consider the following code: <br> x=9 y = -2 z=2<br> print (x + y * z)<br> What is output?
    10·1 answer
  • On a wireless router, what gives out IP addresses?<br> DHCP<br> DNS<br> WPA<br> WPS
    7·1 answer
  • ____________ is a widely accepted international best practices framework for implementing information systems security.
    12·1 answer
  • when using presentation software, which menu can you use to duplicate a slide to use as a template for a new slide?
    14·1 answer
  • The advantages of the dynamo
    15·1 answer
  • Questions Presscomion
    9·1 answer
  • Can somebody help me with this please
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!