1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadezda [96]
3 years ago
9

An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this

user account is used to perform administrative functions
Computers and Technology
1 answer:
jarptica [38.1K]3 years ago
6 0

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.

You might be interested in
Which UPPER function is written so that all text in cell B4 will be capitalized? O=UPPER(B4) O=UPPER[B4] O UPPER B4 O=UPPER
Irina-Kira [14]
The Excel UPPER function converts a text string to all uppercase letters. Numbers, punctuation, and spaces are not affected.

So , Which upper function is written so that all text in cell b4 will be capitalized

Answer is : PROPER function
3 0
2 years ago
Match the feature to its function.
kolbaska11 [484]

Answer:

Match the feature to its function.  The answers are as below:

1. Normal view the place where creating and editing occurs  

2. Notes view an area in which information for handouts can be added  

3. Slide pane the place where the slide order can be changed

4. Menu bar contains lists of commands used to create presentations  

5. toolbars provide rows of icons to perform different tasks  

Explanation:

It is the normal view where the editing and the creation of the slides occur. And it's the notes view where you can add the information for handouts. You can arrange the slides in the slide pane. And you can get a list of commands for creating the presentation in the Menu bar. Also, Toolbar is the rows of icons which helps in performing a various set of tasks. And all these are definitions and prove our above selections are correct.

6 0
3 years ago
someone please tell me if you watch drag race (rupauls drag race) I need someone to talk to about it ​
lys-0071 [83]
I’m gonna watch it soon
3 0
3 years ago
You are part of which sphere of Earth?
Elden [556K]
We are on the lithosphere
4 0
3 years ago
Read 2 more answers
Which group is not found on the sparkline tools design tab? a. format b. type c. show d. style
VashaNatasha [74]
Format sparkline tools design tab
4 0
3 years ago
Other questions:
  • A(n) ____ tag is used to let the compiler know that your intention is to override a method in a parent class
    10·1 answer
  • True or False? In C++, the expression (a + b / c) / 2 is implicitly parenthesized as ((a + b) / c) / 2.
    9·1 answer
  • In a relational database, the three basic operations used to develop useful sets of data are:
    10·1 answer
  • While waiting to be seated at a restaurant, Jason receives a customer loyalty coupon through an app on his mobile phone for half
    7·1 answer
  • Using ________ data mining, the user usually begins by telling the data mining software to look and test for specific patterns a
    15·1 answer
  • A laptop computer communicates with a router wirelessly, by means of radio signals. the router is connected by cable directly to
    10·1 answer
  • A tool in Word that creates multiple copies of the same letter, envelope, or label and inserts personalized data is a(n) _____.
    12·1 answer
  • Which software documentation guideline did the IEEE establish?
    10·1 answer
  • HURRY 50 POINTS A human is needed to create the algorithms that computers use.<br> True<br> False
    14·2 answers
  • Write about how this item was important to you.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!