1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
defon
3 years ago
10

A network administrator is implementing a token system in which a hardware device is used to store a password. The password is u

nknown to the user and transmitted to the system for authentication. If implementing to which of the following attacks is this token type vulnerable?
A) Replay
B) Smurf
C) Collision
D) Privilege escalation
Computers and Technology
2 answers:
riadik2000 [5.3K]3 years ago
8 0

Answer:

D) Privilege escalation

Explanation:

<u><em>Privilege escalation:</em></u>  This is when an intruder gain access to a lower level user account and uses it to gain further access to resources that are normally protected from the lower level users. this mostly achieved by exploiting vulnerabilities like a bug, configurations or design flaws in a lower level user account to gain further or elevated access to the site administrator.

Below  are some of the common privilege escalation techniques that intruders use in gaining access to user account, they include:

i) Using valid accounts

ii)  Manipulating access tokens

iii) Bypassing user account control

An intruders goal in a privilege escalation attack is to gain high-level privileges so as to be able to access importance administrative data without being noticed.

nlexa [21]3 years ago
5 0

Answer:

D) Privilege escalation

Explanation:

Privilege escalation is a situation whereby an attacker exploits a privilege escalation vulnerability in a target system which then allows to override the user account.

A token system is usually vulnerable to privilege escalation attacks. The hacker usually acts as a middle man between the original user and the system. The hacker solicits for the token output from the legitimate user which he then supplies to the system for authentication to gain entrance.

You might be interested in
Difference between hardcopy and hardware​
TiliK225 [7]
Hardware is the tangible, or physical, pieces that make up your computer. ... A soft copy (just like software) remains on the computer and cannot be physically touched while a hard copy (just like your computer's hardware) is a printed piece of paper that be be touched
5 0
3 years ago
No processo fluido a fluido há outra câmara na saída do material extrudado com pressão menor que a câmara anterior. Isso permite
Vesnalui [34]
What is the question ??????????????????????????????????????????????????????????????
4 0
3 years ago
Chelsea is writing a paper about the value of running every day. She wrote this thesis statement:
Masteriza [31]

Answer:

no cloo

Explanation:

8 0
3 years ago
What is information cycle
DIA [1.3K]

Answer:

The term information cycle refers to the way information is processed and distributed and how it changes over time. It is usually used to describe the progression of media coverage relating to a particular newsworthy event or topic during which information goes through various stages of reporting and publication.

8 0
3 years ago
Read 2 more answers
Give a detailed easy to understand explanation what the kerneltrapmode is. WILL AWARD BRAINLIEST!
pochemuha

Answer:

Kernel Trap Mode is one of the Windows 10 errors that often show Blue Screen of Death (BSoD) and cause PC crashes and freezes. Windows 10 error message “UNEXPECTED KERNEL MODE TRAP” is a bug check indicating the CPU generated a trap and the kernel failed to catch the trap.

Explanation:

4 0
3 years ago
Other questions:
  • Excel attempts to guess which cells you want to include in the function by looking for ranges that are adjacent to the selected
    13·1 answer
  • Which ipv6 static route would serve as a backup route to a dynamic route learned through ospf?
    12·1 answer
  • Eric is working on a computer that has a device driver error. Eric can find the name of the device driver however the actual dev
    8·1 answer
  • The Active Directory Users and Computers tool can be used to:______.
    11·1 answer
  • What are the correct steps to find the system specifications such as the amount of RAM or system type?
    13·1 answer
  • Ayuda necesito 7 objetos que se utilizan en la vida diaria
    8·1 answer
  • Because all the IEEE WLAN features are isolated in the PHY and ____________ layers, practically any LAN application will run on
    11·1 answer
  • Differentiate between off the shelf software and bespoke software
    11·1 answer
  • You will need to convert the following binary numbers to hexadecimal. Table 1 contains 16 problems. The first one is completed f
    7·1 answer
  • A pcr-based method to detect a specific pathogen in a specimen works by amplifying a ________ that is specific to the prospected
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!