1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stealth61 [152]
3 years ago
15

A malicious actor has contacted multiple individuals at a company over multiple months in order to convince un-suspecting users

to execute a malicious file on their systems. By doing so, the actor could covertly gain control of those systems and establish a presence inside the network. Which type of malware was the actor attempting to have the users execute?A. Virus.B. Adware.C. Spyware.D. Trojan Horse.
Social Studies
1 answer:
andrezito [222]3 years ago
6 0

Answer:

D. Trojan Horse.

Explanation:

A Trojan horse is a kind of malware that is used to mislead computer users of its original intent. Most Trojan horses are usually not suspicious as they can come as an email attachment, advertisement etc. Immediately the user clicks the file or page, the attacker is able to have unauthorized access to the target network or the affected computer. This can further make the attacker have access to personal information.

This malicious actor who sent the file to several users on a companies network, just requires at least one of the computer users to execute the Trojan horse by clicking on the file, so the actor can have control inside the companies network.

You might be interested in
From Pride and Prejudice
Dafna1 [17]
I think it the one at the last
5 0
3 years ago
Sort the characteristics that descnbe each culture. Aryan Dravidian lived in large cities headed by men had a strong central gov
Elanso [62]

Answer: ryan  lived in large cities, had a strong central government, had highly organized society.

Dravidian  headed by men, ruled by a chief, had strict social classes

Explanation:

7 0
2 years ago
Jin's therapist is currently helping her to recognize that she is unknowingly controlled by a need to dominate people. according
vladimir1956 [14]
The correct answer is the psychodynamic approach.

The psychodynamic approach is an insight-centered therapy approach, where the therapist's main role is uncovering the unconscious processes, thoughts, beliefs etc., that are influencing a client's behaviors and difficulties. By doing so, the therapist helps the client become self-aware of his or her behavioral patterns and unconscious intentions. Since Jin's therapist is helping her recognize her <span>unconscious feelings of inadequacy, she is adopting the psychodynamic approach in therapy. </span>
4 0
3 years ago
Is there a limit on your streak for brainly? I checked in yesterday for day 7, then it became day 1 today
cestrela7 [59]

Answer:

umm, no, im currently on my 29 day streak

Explanation:

no limit

4 0
3 years ago
What founding father said “an educated citizenry is a vital requisite for our survival as a free people?” HELP PLZ
I am Lyosha [343]

Answer:

jefferson

Explanation:

5 0
3 years ago
Other questions:
  • Mention three types of waste​
    12·2 answers
  • Tasha is seeing a therapist because she is depressed. her therapist gives her examples of reinforcing self-statements and trains
    14·1 answer
  • Which of the following statements is true about American women during World War II?
    11·2 answers
  • Choose the principle parts of the verb know . (choose more than one)
    14·1 answer
  • The anti- federalists were against
    15·2 answers
  • At which location would you be most likely to find a high population density?
    8·1 answer
  • Four-year-old john is very competitive with his father in trying to gain more attention from his mother. freud would have sugges
    14·1 answer
  • Which term works best as a title for the list?
    14·2 answers
  • A state that attempts to keep a degree of their status and power in the international system would most likely pursue a ________
    5·1 answer
  • What are some important elements of working with vendors as a sysadmin?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!