1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FromTheMoon [43]
4 years ago
7

Security administrator for your organization utilized a heuristic system to detect an anomaly in a desktop computer's baseline.

The admin was able to detect an attack even though the signature-based IDS and antivirus software did not detect it. Upon further review, it appears that the attacker had downloaded an executable file on the desktop computer from a USB port, and executed it triggering a privilege escalation. What type of attack has occurred?
Computers and Technology
1 answer:
Helen [10]4 years ago
3 0

Answer:

Zero day

Explanation:

Zero day attack is the term used to describe the threat of an unknown security vulnerability in a computer software or application for which either the patch has not been released or the application developers were unaware of or did not have sufficient time to address.

Since the vulnerability is not known in advance, the exploits often occur without the knowledge of the users. A zero day flaw is considered as an important component when designing an application to be efficient and secure.

You might be interested in
PLEASE HELP WILL MARK BRAINLIEST
Sergeeva-Olga [200]
I believe it’s boundaries
3 0
2 years ago
Read 2 more answers
write a java program using a do while loop to prompt the user to enter a password. The user should be prompted to enter the pass
Alex787 [66]
We can import Scanner from Java.utils.Scanner to pull in text entered in the console.

public static void main(String[] args) {
Scanner sc = new Scanner(System.in);
String password = "";
do {
System.out.print("Enter your password: ");
password = sc.nextLine();
if(!password.equals("pals") {
System.out.println(\nIncorrect Password. Try again.");
}
} while(!password.equals("pals");
3 0
3 years ago
IT ethics are rules, policies, or principles that guide the behavior of IT professionals.
Vadim26 [7]

Answer: true

Explanation: true

6 0
3 years ago
How to use github to creat a blog?Thank you
stepan [7]
You can use GitHub Pages! They have tutorials on their site to help you set up using that (too much for this format!). You can use it to make your own personal site, as well as host any existing site you may have.
5 0
4 years ago
How do you select a single cell, a single column, a single
Vedmedyk [2.9K]

Answer:

To select nonsequential cells, click the first cell, hold down the Ctrl key, and click each additional cell (or row or column) you want to select. To selectthe entire worksheet, click the small box located to the left of column A and above row 1. Optionally, you can selectall cells in a worksheet by pressing COMMAND+A......

To select all cells on a worksheet, use one of the following methods:

Click the Select All button.Press COMMAND+A. Note If the worksheet contains data, and the active cell is above or to the right of the data, pressing COMMAND+A selects the current region. Pressing COMMAND+A a second time selects the entire worksheet.

8 0
3 years ago
Other questions:
  • When does the VB.NET programming environment start to operate?
    10·1 answer
  • I have to write this in Java, but i've never even learned it before and i'm completely lost
    12·1 answer
  • I have a question about a hotel tv: So I’ve brought my Nintendo Switch and my dock and plugged it in to the tv. Everything seems
    13·1 answer
  • (20points)
    6·1 answer
  • What is the code for this please?​
    13·1 answer
  • If a switch needs to send information to other switches in the network it would send out a ___________.
    7·2 answers
  • You are between flights at the airport and you want to check your email. Your wireless settings show two options:
    14·1 answer
  • How many times do you return after the dateline ?
    12·1 answer
  • Which sentence describe internet safety precautions?
    5·1 answer
  • 8. Which of the following is an output device
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!