1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slamgirl [31]
3 years ago
5

On a compromised computer, you have found that a user without administrative privileges was able to perform a task limited to on

ly administrative accounts. What type of exploit has occurred?​
a. privilege escalation
b. ​DNS cache poisoning
c. man-in-the-middle
d. ARP poisoning
Computers and Technology
1 answer:
Ksju [112]3 years ago
6 0

Answer:

a. privilege escalation

Explanation:

Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.

Thus, if a user without administrative privileges was able to perform a task limited to only administrative accounts, this can be called as privilege escalation.

DNS cache poisoning is a type of attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from legitimate servers and towards fake ones.

A man-in-the-middle attack is an attack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other.

ARP poisoning is a technique by which an attacker sends Address Resolution Protocol messages onto a local area network.

You might be interested in
Draw the tree that results when you add the values 10, 20, 30, 40, 50, 60, 70, 80, 90, 100 to each of the following initially em
Kay [80]

Answer:

What exactly are you asking?

Explanation:

Please don't report me, I'll edit my answer once I know the question

6 0
3 years ago
What causes air pollution in your community?
nika2105 [10]
Hello.

What causes ari polltion is factors, smoke and gas.
Even climite change can.

Have a nice day
3 0
3 years ago
20 points for ez question lol
slega [8]
I think it might be the third on not certain
5 0
3 years ago
Read 2 more answers
Richard is shopping online and has to enter a password to access his bank account. Which method attribute will securely submit h
kotykmax [81]

Answer:

password

Explanation:

It is certainly the password method attribute, and this can enable Richard to securely submit the credentials. If we set the method attribute or input type as a password, then the password is sent in the encrypted form, and it remains secure. And hence, the password cannot be copied by anybody, and it remains safe. This is the characteristic of a secure web form. And remember we are dealing with an HTML form.

6 0
3 years ago
Read 2 more answers
Identify some advantages of using Excel over lists, paper files, or simple word documents?
ra1l [238]

Answer:

Explanation:

Difficult to manage advanced pricing rules. ...

Lack of control and security. ...

Excel is vulnerable to fraud/corruption. ...

Excel is susceptible to human error. ...

Excel is difficult to troubleshoot or test. ...

Excel is obstructive to regulatory compliance.

Whether it is family-based planning for a weekly, monthly or yearly calendar or a personal appointment daily planner or a schedule for managing bill payments, homework, favorite sports team's games, and many more, excel can make it easy to compile, filter, search, organize and simplify large amounts of data.

6 0
3 years ago
Other questions:
  • What is the advantage of defining a target user?
    14·1 answer
  • An expression that has correctly paired delimiters is called a(n)
    6·1 answer
  • Which service is used when your email program exchanges messages with the mail server on a distant network?
    5·1 answer
  • What function is the responsibility of the network layer?
    10·1 answer
  • What is Napoleon's friend's name? From the Napoleon Dynamite movie.
    14·1 answer
  • Where can i watch twilight breaking Dawn 2 full movie. In the internet where can i wath it for free
    14·1 answer
  • HELP PLEASE What is an internal part of a computer which contains all software programs installed on your computer?
    9·2 answers
  • You CANNOT add text to any filled shape.<br> O True<br> False
    8·1 answer
  • In which step of web design is storyboarding helpful?
    10·1 answer
  • What is destination email address​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!