1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
defon
3 years ago
10

A network administrator is implementing a token system in which a hardware device is used to store a password. The password is u

nknown to the user and transmitted to the system for authentication. If implementing to which of the following attacks is this token type vulnerable?
A) Replay
B) Smurf
C) Collision
D) Privilege escalation
Computers and Technology
2 answers:
riadik2000 [5.3K]3 years ago
8 0

Answer:

D) Privilege escalation

Explanation:

<u><em>Privilege escalation:</em></u>  This is when an intruder gain access to a lower level user account and uses it to gain further access to resources that are normally protected from the lower level users. this mostly achieved by exploiting vulnerabilities like a bug, configurations or design flaws in a lower level user account to gain further or elevated access to the site administrator.

Below  are some of the common privilege escalation techniques that intruders use in gaining access to user account, they include:

i) Using valid accounts

ii)  Manipulating access tokens

iii) Bypassing user account control

An intruders goal in a privilege escalation attack is to gain high-level privileges so as to be able to access importance administrative data without being noticed.

nlexa [21]3 years ago
5 0

Answer:

D) Privilege escalation

Explanation:

Privilege escalation is a situation whereby an attacker exploits a privilege escalation vulnerability in a target system which then allows to override the user account.

A token system is usually vulnerable to privilege escalation attacks. The hacker usually acts as a middle man between the original user and the system. The hacker solicits for the token output from the legitimate user which he then supplies to the system for authentication to gain entrance.

You might be interested in
There are generally two ways of implementing dynamic programming solutions to problems, which have equal asymptotic time complex
san4es73 [151]

Answer:

1) Bottom-up

2) Top-down

Explanation:

In general dynamic programming is a divide and conquer strategy which can be implemented using bottom up approach or top down approach.

Bottom-up approach in dynamic programming will solve a relatively simple sub-problem first and then use the solution to build and arrive at solutions to a bigger sub-problem.

Top down approach is reversed to bottom-up approach and is also known as Memoization Method. Instead of solving a problem started from the base state sub-problem, the top down approach break a problem into a smaller problems from the top most destination state until it reaches the bottom most base state.

8 0
3 years ago
What type of cable is used to connect a workstation serial port to a cisco router console port?
butalik [34]

a <span>Ethernet-<span>Cable is a how to put it together</span></span>

<span><span /></span>

6 0
3 years ago
Which of the following, when used in conjunction with hyperlinks, can be useful for easily navigating a Word document? : *
Valentin [98]
Caption is a best answer i hope its work
7 0
3 years ago
Yesterday you installed a new game on your computer. When you ran the computer, you noticed that the application was running ver
Nady [450]

Since I have rechecked and noticed that it is not a disk space shortage, then the problem should not be on the disk but the RAM. Even basic tasks like opening up a Word document can be slow if you do not have enough RAM. You can check RAM usage in task manager by right clicking on the taskbar and selecting the task manager option. You will be required to click on the Performance tab of the task manager. Here, you will be able to graphically view how much RAM on your computer is being used. If the RAM is being over-utilized, you will have to consider upgrading your PC with more RAM.

5 0
3 years ago
I need help with this
Mila [183]

Either Styles or Formula


5 0
3 years ago
Read 2 more answers
Other questions:
  • What occurs when information is copied from an internet source to another computer?
    6·1 answer
  • Sending a employee an email with important criticism represents a problem which communication process
    9·1 answer
  • Your car must have two red stoplights, seen from ______ feet in the daytime, that must come on when the foot brake is pressed.
    6·1 answer
  • You resurrected an old worksheet. It appears to contain most of the information that you need, but not all of it. Which step sho
    5·1 answer
  • A method a. may have zero or more parameters b. never has parameter variables c. must have at least two parameter variables d. m
    10·1 answer
  • Write a statement that compares the values of score1 and score2 and takes the following actions. When score1 exceeds score2, the
    7·1 answer
  • F he continues to make monthly payments of $100, and makes no new purchases, how many more payments will he have to make before
    13·1 answer
  • Engineers at Edison Laboratories developed a _____ strip that allowed them to capture sequences of images on film.
    14·2 answers
  • Click here for a answer
    15·1 answer
  • HELP ME ⚠️‼️⚠️‼️ DUE IN EXACTLY 27 MINUTES
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!