1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slamgirl [31]
3 years ago
5

On a compromised computer, you have found that a user without administrative privileges was able to perform a task limited to on

ly administrative accounts. What type of exploit has occurred?​
a. privilege escalation
b. ​DNS cache poisoning
c. man-in-the-middle
d. ARP poisoning
Computers and Technology
1 answer:
Ksju [112]3 years ago
6 0

Answer:

a. privilege escalation

Explanation:

Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.

Thus, if a user without administrative privileges was able to perform a task limited to only administrative accounts, this can be called as privilege escalation.

DNS cache poisoning is a type of attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from legitimate servers and towards fake ones.

A man-in-the-middle attack is an attack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other.

ARP poisoning is a technique by which an attacker sends Address Resolution Protocol messages onto a local area network.

You might be interested in
list out the application of the computer and explain it?(and as the answer for this question as image) ​
amid [387]

Answer:

There are several applications of the computer; some of these applications are:

  • Word processors
  • Graphics applications
  • Web browsers
  • Gaming
  • Media players
  • Alarms and tasks schedulers
  • Etc...

Explanation:

The computer system can be applied in various fields (such as medicine, gaming, governments, education, etc.) for various purposes.

Each of these fields require computer software products and/or applications to carry out their activities. I've listed some applications, but there are several other applications.

<em>My explanation could not be submitted; so, I added it as an attachment.</em>

Download txt
3 0
3 years ago
Which term best describes the operating system of a computer
ololo11 [35]

Answer: System Software

Explanation:

7 0
3 years ago
a. a large central network that connects other networks in a distance spanning exactly 5 miles. b. a group of personal computers
ki77a [65]

Complete Question:

A local area network is:

Answer:

b. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information such as a set of rooms, a single building, or a set of well-connected buildings.

Explanation:

A local area network (LAN) refers to a group of personal computers (PCs) or terminals that are located within the same general area and connected by a common network cable (communication circuit), so that they can exchange information from one node of the network to another. A local area network (LAN) is typically used in small or limited areas such as a set of rooms, a single building, school, hospital, or a set of well-connected buildings.

Generally, some of the network devices or equipments used in a local area network (LAN) are an access point, personal computers, a switch, a router, printer, etc.

4 0
3 years ago
What is the role of a design tWhat is the role of a design tool in a Robotic Process Automation (RPA) solution?
marin [14]

Answer and Explanation:

Robotic Process Automation(RPA) are software tools that apply artificial intelligence(AI) technology to automate digital routine tasks for business executives. It mimics everyday tasks and automatically executes them for the user.

Design tools in RPA play the role of infusing the best design into RPA software, it works with the popular phrase "design thinking". Robotic process automation software are now in tune with the popular buzz of a user centered approach to design of RPA tools. This ideology focuses on deploying RPA software that appeals to users and are therefore market friendly.

4 0
3 years ago
Transcription in a virus that has an rna genome is complex because __________.
AnnZ [28]
I had to look for the options and here is my answer:

Transcription in a virus that contains an RNA genome is complicated due to the following reasons: the virus has to create a DNA intermediate, the viral genome needs to encode for RNA-dependent RNA polymerase, and lastly, the virus needs to have its own <span>RNA-dependent RNA polymerase.</span>
8 0
3 years ago
Other questions:
  • The most popular input device of a computer is a(n) ____.
    6·1 answer
  • If num is an int which expression always evaluates to true if num holds an odd number
    15·1 answer
  • (True/False). If the definition of an IS is the medium for recording and storing data, and disseminating information, this would
    12·2 answers
  • What is a programming language?
    11·2 answers
  • #Write a function called alter_list. alter_list should have#two parameters: a list of strings and a list of integers.##The list
    11·1 answer
  • Suppose users share a 1 Mbps link. Also suppose each user
    10·1 answer
  • PLZ HELP
    15·2 answers
  • Algorithms can be created in all the following ways EXCEPT:
    10·1 answer
  • Write a paragraph discussing privacy issues on the internet<br> and their impact on human lives.
    9·1 answer
  • What is the purpose of each component ?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!