1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FromTheMoon [43]
4 years ago
7

Security administrator for your organization utilized a heuristic system to detect an anomaly in a desktop computer's baseline.

The admin was able to detect an attack even though the signature-based IDS and antivirus software did not detect it. Upon further review, it appears that the attacker had downloaded an executable file on the desktop computer from a USB port, and executed it triggering a privilege escalation. What type of attack has occurred?
Computers and Technology
1 answer:
Helen [10]4 years ago
3 0

Answer:

Zero day

Explanation:

Zero day attack is the term used to describe the threat of an unknown security vulnerability in a computer software or application for which either the patch has not been released or the application developers were unaware of or did not have sufficient time to address.

Since the vulnerability is not known in advance, the exploits often occur without the knowledge of the users. A zero day flaw is considered as an important component when designing an application to be efficient and secure.

You might be interested in
Public classes are accessible by all objects, which means that public classes can be ____, or used as a basis for any other clas
jonny [76]

Answer:

The correct answer is d.extended.

Explanation:

In order to have a superclass in Java, it is indispensable to extend, or inherit from, a class. It means that a subclass is created by an extended class. All the classes in Java only need one superclass from which it inherits some of its fields and methods.

7 0
3 years ago
Read 2 more answers
Do you want my hero academia?<br><br><br><br><br><br> if so, who's your favorite character :&gt;
VMariaS [17]

Shoto Todoroki and Katsuki Bakugo

4 0
3 years ago
Read 2 more answers
Hard drives have the largest capacity of any storage device. <br> a. True <br> b. False
VMariaS [17]
It's false as they store way lesser than we think
3 0
3 years ago
Read 2 more answers
A technician is trying to recover information on a computer that has been hidden or deleted on purpose in order to hide evidence
igomit [66]

Answer:

Data recovery

Explanation:

Data recovery -

It is the method involved in computer , where the lost , damaged or corrupted file or data is gained back again , is referred to as data recovery.

The information is recorded by some secondary method , when the file cannot be accessed in the original manner.

Hence , from the given scenario of the question,

The correct term is data recovery.

4 0
3 years ago
In order to create a horizontal 2-inch-thick dotted green line exactly 2 inches away from the top of the canvas, a graphic artis
Harrizon [31]

Answer:

I Think meter .

Explanation:

Not so Sure

4 0
3 years ago
Read 2 more answers
Other questions:
  • Why were the spices in Asia so expensive when sold in Europe?
    11·2 answers
  • What Windows Server 2016 feature leverages the storage contained on a network of servers and adds a new level of fault tolerance
    14·1 answer
  • Which dialog box opens after selecting a cell in the list of prepared data, clicking the insert tab on ribbon and the clicking t
    6·1 answer
  • What is the purpose of an exhaust emission system
    6·1 answer
  • Which of the items listed is not considered to be personal protective equipment (PPE)?
    14·1 answer
  • Breaking code rules is only a problem once in a while. Group of answer choices True False
    12·1 answer
  • If anyone wants to ft heres the link
    6·1 answer
  • Which term describes the surrounding area of this image?
    10·1 answer
  • Which statement is true with respect to Java?
    12·1 answer
  • after adding a sound to a slide, the audio tools tab will allow you to apply artistic effects and quick styles to your sound ico
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!