1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zinaida [17]
3 years ago
12

A hacker posing as a potential customer has connected to your network and has discovered that a server running Windows Server ha

s a configuration that a misconfiguration on a Windows Server that exposes the PowerShell prompt. The hacker executes a script to log valuable information about the server. Which vulnerabilities did the hacker exploit
Computers and Technology
1 answer:
3241004551 [841]3 years ago
7 0

Answer:

Lack of ips

Insecure configuration

Explanation:

Lack of IPS

This is fully known as intrusion prevention softwares this works by enabling the firewall and protecting the computer system from unauthorised users and potential attackers and it prevents data from being stolen by identifying potential attacks. It monitors the network continuously, thereby looking for possible malicious threats and also capturing informations about these threats.

Insecure configuration

Obviously if you have power shell enabled then you would have a secure configuration. Attackers can easily access your system in the presence of this flaw.

You might be interested in
In cell B7, enter a formula without using a function to determine the profit generated at the Downtown location by subtracting t
Archy [21]

Answer & Explanation:

The formula in the cell B7 would be:

"=B5-B6"

And now we will press "Ctrl+C" to copy the formula in the Cell B7. After copying we will select the cell range C7 to D7 and press "Ctrl+V" to paste this formula in the cell C7:D7 and then will press Enter key. Now what we see is results in C7:D7 which we can check in our calculator whether these are corectly calculated or not.

3 0
4 years ago
The PowerPoint view in which you can edit the slide master is called ______________.
nirvana33 [79]

Answer:

it's slide master view.

8 0
3 years ago
Consider the following methods:
il63 [147K]
<span>2. basketball This is a classic case of overloading in C++. You have 2 functions, both named "printSport", but one of the functions receives an input of type double, and the other receives an input of type int. The specified method call passes a parameter of type int, so the version of printSport is called that receives a parameter of type int. And that version of printSport only prints the word "basketball". The other version of printSport is never called at all.</span>
4 0
4 years ago
a circuit has an inductor with an inductive reactance of 230 ohms. this inductor is in series with a 500 ohm resistor. if the so
Amanda [17]

Answer: attached below

Explanation:

8 0
4 years ago
Use the commands you've learned so far to draw a
Murrr4er [49]

The app you shown in the picture is that app scracth?

8 0
3 years ago
Other questions:
  • Match the software requirements of a server to their purpose
    5·1 answer
  • What OS is most commonly used by businesses? Linux Macintosh Microsoft Windows
    11·1 answer
  • In Florida no fault insurance is optional for owners of a vehicle
    6·1 answer
  • Are mobile phones hazardous to your health?
    13·2 answers
  • A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
    14·1 answer
  • A manager would like information on the knowledge base searches conducted by customers and call center agents. Which two metrics
    10·1 answer
  • How to measure potential energy of a ball?
    14·1 answer
  • Computer Science uses the power of ______________ to solve problems.
    10·1 answer
  • Java !!!
    10·1 answer
  • Describe a NIC card and can you have more than one?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!