1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zinaida [17]
3 years ago
13

An organization's Finance Director is convinced special malware is responsible for targeting and infecting the finance departmen

t files. Xander, a security analyst, confirms the files are corrupted. Xander is aware the Director possesses privileged access but not the security knowledge to understand what really happened. What does Xander believe happened
Computers and Technology
1 answer:
tia_tia [17]3 years ago
6 0

Answer: Malware infected the Director's machine and used his privileges

Explanation:

Malware simply means malicious software variants, which consists of spyware, viruses, ransomware etc. These can be used by cyberattackers to cause damage to data or in order to have access to a network.

With regards to the question, Xander believed that malware infected the Director's machine and used his privileges which results in the corrupt of the files.

You might be interested in
The input stream of a stack is a list of all the elements we pushed onto the stack, in the order that we pushed them. If the inp
Sidana [21]

Answer:

Push Z

Push Y

Pop Y

Push X

Pop X

Push W

Push V

Pop V

Push U

Pop U

Pop W

Pop Z

Push T

Push S

Pop S

Push R

Pop R

Pop T

Explanation:

A stack is a term in computer science that defines an abstract data type that acts as a collection of elements. It has two operations which are mainly push and pop.

Push is used in adding elements to the collection, while pop is used in removing elements from the collection.

If the element A has been pushed to the stack, you check if the top element in the pop[] sequence is A or not.

If it is A, you then pop it right, else top of the push[] sequence will be changed and make the sequences invalid.

So, similarly do the same for all the elements and check if the stack is empty or not in the last.

If empty you then print True else print False.

4 0
3 years ago
Chris needs to modify the default bullets that are used in a nonnumbered list in Word.
kotegsom [21]

Answer:

Select the arrow next to the bullet list option in the Paragraph group.

Explanation:

This allows you to decide what shape of bullets you would like to have.

Hope this helps!

Note: I personally recommend using stars :)

6 0
3 years ago
Define what is meant by an entity in a data model. How should an entity be named? What information about an entity should be sto
AURORKA [14]

Answer:

Check the explanation

Explanation:

An entity can be a person, place, thing, or even an event about which data is collated and stored. Entities names usually are nouns.

The Entity Data Model (EDM) is an extensive model of the Entity-Relationship model which identifies the conceptual model of the data using a variety of modeling technique. It acan also be termed as a set of concepts that illustrates data structure, regardless of its stored form.

The Information stored or can be stored in a CASE repository regarding an entity includes:

Name

Definition

Special Notes

7 0
3 years ago
Why do you put www. in front of websites?
natulia [17]
WWW stands for world wide web
5 0
4 years ago
To close the ____ view, click File on the Ribbon or click the preview of the document in the Info gallery to return to the docum
nordsb [41]
Your answer would be D,
7 0
4 years ago
Other questions:
  • Using commands you learned in lessons 1 and 2. Get your IP address, netmask, DNS hostname, and MAC address. Compare these with y
    5·1 answer
  • write a 〕ava program to sort a random list of 10 numbers entered b y user in an array using Selection Sort technique
    5·1 answer
  • Write a program that reads a floating-point number from the user and prints "zero", "positive" or "negative"
    13·1 answer
  • The R1 shell opens in a terminal window with black text and white background. What user is logged into
    8·1 answer
  • What does px mean in css ?
    13·1 answer
  • 1. Before operating any power tool, you need to
    14·1 answer
  • What is the best way to get the most out of the box?
    14·2 answers
  • When using the text command, what needs to be around the word or words you<br> want to appear?
    10·1 answer
  • Please explain what is Ribbon?  give examples​
    7·2 answers
  • Deirdre has a hearing disability. One of her friends advised her to use real-time text or RTT on her phone. In which of these
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!