1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
defon
3 years ago
10

A network administrator is implementing a token system in which a hardware device is used to store a password. The password is u

nknown to the user and transmitted to the system for authentication. If implementing to which of the following attacks is this token type vulnerable?
A) Replay
B) Smurf
C) Collision
D) Privilege escalation
Computers and Technology
2 answers:
riadik2000 [5.3K]3 years ago
8 0

Answer:

D) Privilege escalation

Explanation:

<u><em>Privilege escalation:</em></u>  This is when an intruder gain access to a lower level user account and uses it to gain further access to resources that are normally protected from the lower level users. this mostly achieved by exploiting vulnerabilities like a bug, configurations or design flaws in a lower level user account to gain further or elevated access to the site administrator.

Below  are some of the common privilege escalation techniques that intruders use in gaining access to user account, they include:

i) Using valid accounts

ii)  Manipulating access tokens

iii) Bypassing user account control

An intruders goal in a privilege escalation attack is to gain high-level privileges so as to be able to access importance administrative data without being noticed.

nlexa [21]3 years ago
5 0

Answer:

D) Privilege escalation

Explanation:

Privilege escalation is a situation whereby an attacker exploits a privilege escalation vulnerability in a target system which then allows to override the user account.

A token system is usually vulnerable to privilege escalation attacks. The hacker usually acts as a middle man between the original user and the system. The hacker solicits for the token output from the legitimate user which he then supplies to the system for authentication to gain entrance.

You might be interested in
Study the sentence below
Tanzania [10]

Answer:

call

Explanation:

call is a way for a person to draw attention to the way a person conveys information to someone he wants.

7 0
3 years ago
Read 2 more answers
Write an application that accepts a word from a user and converts it to Pig Latin. If a word starts with a consonant, the Pig La
Scorpion4ik [409]

Answer:

Written in Python

word = input("Word: ")

if(word[0]=='a' or word[0]=='e' or word[0]=='i' or word[0] =='o' or word[0]=='u'):

     print(word+"ay")

else:

     a = word[1:]

     print(a+word[0]+"ay")

Explanation:

<em>The program was written in Python and I've added the explanation as an attachment; where I used comments as explanations</em>

Download txt
7 0
4 years ago
Which best describes the purpose of LoJack on a computer
iris [78.8K]

Answer:The purpose of the lo jack on a computer  to the lock and delete files on the computer devices.

Explanation:The lo jack on a computer to locate all the lock and delete files.

lo jack can provides the computer on the passwords that contains different levels of the bios access.

lo jack perform on the computer operating system provides on the boot only the trusted by the computer operating system.

Lo jack computer on the function is used to the published  the exam answers on the websites.

Lo jack insures to the data into hard drives to the correct computer password.

3 0
3 years ago
An information system will be developed to keep track of a utility company's assets, such as buildings, vehicles, and equipment.
Daniel [21]

The four standard layers of a layered architecture are:

  • presentation,
  • business,
  • persistence,
  • database.

<h3>What is a Layered Architecture?</h3>

This refers to the architectural style that is used to show components with similar functions in horizontal layers that have specific roles.

Hence, we can see that no generic info system architecture was attached to the answer, so it would be impossible to create a layered architecture, so a general overview was given about layered architecture.

Read more about layered architecture here:

brainly.com/question/2563702

#SPJ1

8 0
2 years ago
When someone asks, Is this information specific enough?, he or she is interested in more _____.
AVprozaik [17]

Answer:

precision

Explanation:

In simple English precise means exact or something specific

5 0
3 years ago
Read 2 more answers
Other questions:
  • An option button is a square button that enables you to make one choice among two or more options.
    15·1 answer
  • Which describes the purpose of the continue statement in Java?
    5·1 answer
  • "Common knowledge" must always be credited or else it is considered plagiarism?<br> True<br> Fales
    5·1 answer
  • Which type of computer are todays most widely used personal computers?
    8·2 answers
  • A PenTester has successfully exploited a remote host on a clients’ network. They want to create a backdoor on the host for futur
    11·1 answer
  • Every modern nation has a Central Bank. Which of the following is the Central Bank for these United States?
    14·2 answers
  • Conduct research to determine the best network design to ensure security of internal access while retaining public website avail
    9·1 answer
  • How do you add verticse in edit mode blender
    5·1 answer
  • Describe an example of a very poorly implemented database that you've encountered (or read about) that illustrates the potential
    12·1 answer
  • Explain why people struggle to control themselves when they engage with social media
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!