1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bagirrra123 [75]
4 years ago
12

An attacker has obtained the user ID and password of a data center's backup operator and has gained access to a production syste

m. Which of the following would be the attacker's NEXT action?
A. Perform a passive reconnaissance of the network.
B. Initiate a confidential data exfiltration process
C. Look for known vulnerabilities to escalate privileges
D. Create an alternate user ID to maintain persistent access
Computers and Technology
1 answer:
solong [7]4 years ago
3 0

Answer:

D.

Explanation:

Based on the information provided surrounding this scenario, it can be said that the most likely next course of action would be to create an alternate user ID to maintain persistent access. This would allow the attacker to have continuous access into the network in the case that the system administrators detect that the operator's user ID and password have been compromised. Thus also giving the attacker ample time to infiltrate and find vulnerabilities in the network through an alternate hidden user ID.

You might be interested in
Write a program that reads in your question #2 Python source code file and counts the occurrence of each keyword in the file. Yo
scoray [572]

Answer:

Here is the Python program:

import keyword  #module that contains list of keywords of python

filename = input("Enter Python source code filename: ") # prompts user to enter the filename of a source code

code = open(filename, "r") # opens the file in read mode

keywords = keyword.kwlist #extract list of all keywords of Python and stored it into keywords

dictionary = dict() #creates a dictionary to store each keyword and its number of occurrence in source code

for statement in code: # iterates through each line of the source code in the file

   statement = statement.strip() # removes the spaces in the statement of source code  

   words = statement.split(" ") #break each statement of the source code into a list of words by empty space separator

   for word in words:# iterates through each word/item of the words list  

       if word in keywords:#checks if word in the code is present in the keywords list of Python  

           if word in dictionary: #checks if word is already present in the dictionary

               dictionary[word] = dictionary[word] + 1 #if word is present in dictionary add one to the count of the existing word

           else: #if word is not already present in the dictionary  

               dictionary[word] = 1 #add the word to the dictionary and set the count of word to 1

for key in list(dictionary.keys()): #iterates through each word in the list of all keys in dictionary  

   print(key, ":", dictionary[key])# prints keyword: occurrences in key:value format of dict

Explanation:

The program is well explained in the comments attached with each line of the program.  

The program prompts the user to enter the name of the file that contains the Python source code. Then the file is opened in read mode using open() method.

Then the keyword.kwlist statement contains the list of all keywords of Python. These are stored in keywords.

Then a dictionary is created which is used to store the words from the source code that are the keywords along with their number of occurrences in the file.

Then source code is split into the lines (statements) and the first for loop iterates through each line and removes the spaces in the statement of source code .

Then the lines are split into a list of words using split() method. The second for loop is used to iterate through each word in the list of words of the source code. Now each word is matched with the list of keywords of Python that is stored in keywords. If a word in the source code of the file is present in the keywords then that word is added to the dictionary and the count of that word is set to 1. If the word is already present in the dictionary. For example if there are 3 "import" keywords in the source code and if 1 of the import keywords is already in the dictionary. So when the second import keyword is found, then the count of that keyword is increased by 1 so that becomes 2.

Then the last loop is used to print each word of the Python that is a keyword along with its number of occurrences in the file.

The program and its output is attached in a screenshot. I have used this program as source code file.

7 0
3 years ago
Nick won a $1,000 lottery prize. He can't decide what he should spend the money on. For some time now, he has been planning to b
miv72 [106K]
The opportunity cost is the full cost of the trip
4 0
3 years ago
_____ refers to the busiest calling hour of the day, week, month or year. And _____ refers to the average length of time the sub
Butoxors [25]

Answer: a) busy hour  b) Average handle time.

Explanation:

a) In order to design a telephony circuit, trunk, or call center, it is needed to take into account the busiest calling hour (as a "sliding" 60-minute period) in one day, or week, month or year, generally calculated as an average.

This period is called the "busy hour" and is used to compute the traffic intensity, in Erlangs, considering that if the circuit is busy 100% of the time during 3600 seconds, it will be cursing 1 Erl of traffic.

This traffic can result from 60 calls of 1 min each, 36 calls of 100 sec each, or any combination that have the same outcome of 1 Erl.

b) In order to define, for instance, the number of employees in a call center, a very important parameter is the average time used for each call, adding the queuing time, the true talk time and any other time needed to  set up a successful call, i.e., the time that the subscriber stays on the phone after putting the call.

This time is known as AHT (Average Handle Time).

3 0
4 years ago
A(n) _____ allows individuals to create and publish a profile, create a list of other users with whom they share a connection (o
Mice21 [21]

Answer:

Social Networks

Explanation:

Social Network provides a way for users to create a profile, create a list of other users whom they share a connection with. This allows users to connect with other users who share similar interests with them. Businesses can also leverage the power of the social network to boost their sales and gain more reach and visibility.

4 0
3 years ago
Please please help me
Sholpan [36]

Answer:

increase your browser security settings

8 0
3 years ago
Other questions:
  • Can someone can help me am dont know how much RAM do i need. I use my pc for work and to watch yt vid. Thanks​
    10·1 answer
  • To move to the most extreme right cell containing data in your worksheet, what basic key combination can you use?
    7·1 answer
  • Pick the correct statements regarding cell references.
    8·2 answers
  • computer has a 32-bit instruction word broken into fields as follows: opcode, six bits; two register file address fields, five b
    11·1 answer
  • BRALYEST TO FIRST PERSON THAT IS CORRECT!!! Select the correct navigational path to add titles to your printable worksheet. Clic
    9·2 answers
  • Below is an image from Google Trends that plots Cats and Dogs. It shows a line that is higher for dogs than cats. Choose the mos
    11·1 answer
  • One of the most toxic components of a computer is the _____.
    7·1 answer
  • An error condition consisting of an error in the passing of parameters -- a method passes or returns an unexpected value such as
    12·1 answer
  • Three common risk factors for young drivers and how you plan to minimize these factors.
    13·1 answer
  • What are some of the characteristics found in an editorial photograph?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!