1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Likurg_2 [28]
2 years ago
12

Lori Redford, who has been a member of the Project Management group, was recently promoted to manager of the team. She has been

added as a member of the Managers group. Several days after being promoted, Lori needs to have performance reviews with the team she manages but she cannot access the performance management system. As a member of the Managers group, she should have the Allow permission to access this system. What is most likely preventing her from accessing this system
Computers and Technology
1 answer:
Marat540 [252]2 years ago
3 0

Answer:

she is still a member of the Project Management group

Explanation:

The most likely reason for this is that she is still a member of the Project Management group. This would prevent her from accessing the performance management system. The performance management system most likely allows access to the Managers Group but denies access to the Project Management Group. Therefore, since the deny access overrides the allow access, it would ultimately cause Lori to be unable to access the system. In order to fix this, she would simply need to leave the Project Management Group.

You might be interested in
When doing a complex presentation, which of the following would be the best tool to begin designing your presentation?
Tomtit [17]

Answer:

B.) Open Office Impress

Explanation:

The options are:

A.) Open Office Writer

B.) Open Office Impress

C.) an outline

D.) photographs

Out of the above, the Impress is used for doing complex presentation, and its one of the best tool for it like PowerPoint. Its quite the same as PowerPoint, and it supports both ppt format as well as odp or the open document presentation format. You can make very complex presentations with the help of the Open office Impress.

7 0
3 years ago
Read 2 more answers
An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this
jarptica [38.1K]

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.

6 0
3 years ago
Select the correct answer.
Umnica [9.8K]

Answer:

OB. by zooming in on them

hope it helps

7 0
2 years ago
How many micro processors will a small computer have? A. none B. two C. one D. three
kifflom [539]

Answer:

letter C

They only have one chip with two complete microprocessors on it, both of them share one path to memory and peripherals.

3 0
3 years ago
Read 2 more answers
Which event occurs when the user clicks on an html element?
svet-max [94.6K]
Javascript can be executed i believe. but i just googled it,check it for yourself
8 0
3 years ago
Other questions:
  • What is a browser? Give one example
    8·2 answers
  • A cpu with an external clock speed of 2 ghz and a 64-bit data bus can (theoretically) transfer how much data per second?
    8·1 answer
  • Write the definitions of two classes Day and Night. Both classes have no constructors, methods or instance variables. Note: For
    8·1 answer
  • Which wireless communication technology is most likely used when synchronizing device information to an automobile?
    14·1 answer
  • A rang check that could be use to validate... Date and time
    13·1 answer
  • Write 5 chart types​
    12·1 answer
  • A cpu handless all the instruction that it recieces from hard ware and software which are available on the computer true or fals
    7·1 answer
  • When does the following while-loop stop running?
    10·1 answer
  • What is the difference between php and html?​
    13·2 answers
  • A program is required to three (3) numbers. calculate and print their total
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!