1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadezda [96]
3 years ago
9

An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this

user account is used to perform administrative functions
Computers and Technology
1 answer:
jarptica [38.1K]3 years ago
6 0

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.

You might be interested in
Assume that you have been hired by a small veterinary practice to help them prepare a contingency planning document. The practic
nikdorinn [45]

Answer:

Answer explained below

Explanation:

Given: The information provided is given as follows:

  • There is a small veterinary practice which includes the services like office visits, surgery, hospitalization and boarding.
  • The clinic only has a small LAN, four computers and internet access.
  • The clinic only accepts cats and dogs.
  • Hurricanes are the major threatening factor in the geographical region where the clinic is located.
  • The clinic is established in a one-story building with no windows and meet all the codes related to hurricanes.
  • As public shelters do not allow animals to stay when there is a possibility of hurricanes, therefore the clinic does not accept animals for boarding during that time

Contingency planning documents for the tasks given is as follows:

  1. Threat category along with their business impact:
  • Hurricane: It is given that the region where the clinic is located is highly threatened by hurricanes. This type of disaster can affect the life of the employees as well as patients present in the building. Also, in case of a strong hurricane, the building can also be damaged.
  • Preventive measures: Separate shelters can be installed for animals in case of emergency.

  • Fire: In case of fire due to malfunctioning of any electrical equipment or any other reason, there is no window or emergency exit available. It can damage the building and the life of the employees and animals will be in danger.
  • Preventive measures: Services should be provided to all the electrical equipment’s from time to time and emergency exits should be constructed so that there is a way to get out of the building in case the main entrance is blocked due to any reason in the time of emergency.

  • Viral Influenza: If an employee or animal is suffering from any serious viral disease. That viral infection can easily spread to others and make other animals as well as employees sick. If the employees working in the clinic are sick. This will highly affect the efficiency of them which will then affect the business.
  • Preventive measures: This can be avoided by giving necessary vaccines to the employees from time to time and taking care of the hygiene of the patient as well as the clinic which will make the chance of infection to spread low.

  • Flood: In case of a flood like situation, as given the building has only one story and there is no emergency exit for employees and animals to escape. This can put the life of the employees and animals in danger and can affect the working of the clinic as well.
  • Preventive measures: This can be prevented by collecting funds and increasing the story’s in the building or constructing alternate site location so that in case of emergency, the animals or employees can be shifted to other locations.
4 0
4 years ago
You are sharing your computer screen to collaborate on a document. Which view should you use to minimize the ribbon and give you
Alinara [238K]

The view that you should use to minimize the ribbon and give your document the most screen space is Read Mode (Windows) or Focus (Mac).

<h3>What is Microsoft read mode?</h3>

Microsoft Office is one that gives a lot of different views for documents, and one of which is read mode.

Note that the Read Mode was set to help remove distractions while reading and working on document.

Therefore, The view that you should use to minimize the ribbon and give your document the most screen space is Read Mode (Windows) or Focus (Mac).

See options below

Read Mode (Windows) or Focus (Mac)

Draft view

Web Layout view

Outline view

Learn more about computer from

brainly.com/question/24540334

#SPJ1

5 0
2 years ago
What does IP stand for (as in IP address)? Also, what is overtype mode?
tino4ka555 [31]
An  IP address is mostly for your WIFI . Internet Protocol . 

Overtype Mode is where you are making changes to text (putting in new characters) 
4 0
3 years ago
Tom wants a way to automatically create ads and simplify campaign management, using his resources and Google's machine learning
borishaifa [10]

Answer:

Account product feed and uploaded assets

Explanation:

Account product feed and uploaded assets are needed to accomplish Tom’s aims of creating ads automatically and simplify campaign management as part of his Smart Shopping campaign. With Smart Shopping campaigns, Tom’s existing product feed and assets are combined with Google’s machine learning to show a variety of ads across networks.

3 0
4 years ago
You have four DCs in your domain. Active Directory appears to be corrupted on one of the DCs, and you suspect a failing hard dri
Softa [21]

Answer:C

Explanation:

5 0
3 years ago
Other questions:
  • What does CSS stand for?
    8·2 answers
  • Which feature of a word processing program enables you to represent an text information in the form of a diagram?
    14·2 answers
  • Jason needs to renew the certificate for his company’s web server. Which of the following is recommended to be submitted to the
    6·1 answer
  • What is the signifigance of the following sentence in relation to font? The quick brown fox jumps over the lazy dog? A. It has e
    5·1 answer
  • While using a word processor to create a project report, Ashley includes the subject, title, and the author's name in the report
    7·1 answer
  • How has the Aswan High Dem had an adverse effect on human health?​
    11·1 answer
  • Most of the revenue that magazine companies generate comes from?
    8·2 answers
  • How can you prevent someone with access to a mobile phone from circumventing access controls for the entire device
    5·1 answer
  • Ask the user for five-coordinate pairs. Store each pair as a tuple, and store all the pairs in a list. Print the slope between a
    13·1 answer
  • list three things that can spoil a printer if they are not of the correct specification and what damage may be caused​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!