An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions

Answers

Answer 1

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.


Related Questions

Q5: Which two sensors would be used in an outdoor intruder safety light system?
Pressure sensor. Or motion sensor best answer shakl get brainliest

Answers

Answer:

Motion sensor.

Explanation:

I think it is easy to track the intruder with a motion sensor rather than with a pressure sensor

Sabiendo que z1 = 10, z2 = 20, z3 =10 , z4 = 20, n1 = 1200 rpm.

a) Realiza un esquema en planta del mecanismo.

b) Calcula n2 n3, n4. y la relación de transmisión.

c) Sabiendo que z1 = 10, z2 = 20, z3 =10 , z4 = 20, n1 = 1200 rpm.

Answers

Answer:

a. engranaje 1 → engranaje 2 → engranaje 3 → engranaje 4

     z1 = 10            z2 = 20              z3 =10            z4 = 20

b. n2 = 600 rpm, n3 = 1200 rpm, n4 = 600 rpm

   la relacion de transmision = 2

Explanation:

where z1 = 10, z2 = 20, z3 = 10, z4 = 20

and n1 = 1200 rpm

n2 = n1 * z1/z2 = (1200 * 10)/ 20 = 600 rpm

n3 = n2 * z2/z3 = (600 * 20)/ 10 = 1200 rpm

n4 = n3 * z3/z4 = (1200 * 10)/ 20 = 600 rpm

la relacion de transmision = z2/z1 * z3/z2 * z4/z3

= 20/10 * 10/20 * 20/10 = 2 * 0.5 * 2 = 2

please answer this question​

Answers

Answer:

17. True

18. Backup

Explanation:

Surfing the internet refers to going through various websites to find the different things that you want. This is also the same as browsing the internet. For this reason, both words can be used interchangeably to describe going to different websites on the internet.

When we store our data on alternative storage such as pen drives, hard disks and online storage services, we are backing up our data so that in the event that we lose access to the primary storage device, we will still have the data in those alternative storage devices and services.

pls pls pls helppp!! I NEED SOMEONE WHO IS A PRO AT COMPUTER SCIENCE CODING LIKE PYTHON AND STUFF TO CREATE A ZOOM AND HELP ME WITH SOMETHING!! :))) PLEASEEE

Answers

Answer:

?

Explanation:

what is processing for a computer?​

Answers

Answer:

is an action or series of actions that a microprocessor, also known as a central processing unit (CPU), in a computer performs when it receives information.

Which term describes the part of a file name after the period that indicates which application can create or open it?
O CSV
O path
O extension
O delimiter

Answers

Extension because blah blah blah Im just jk but since I think its extension so I thought I’d let you know :)

What do you use the Pygame library for?

Answers

Answer:

Pygame is a cross-platform set of Python modules designed for writing video games. It includes computer graphics and sound libraries designed to be used with the Python programming language.

which of the following has the highest storage capacity?
a.digital versatile disc
b.computer disc
c.floppy disk
d.hard disk

Answers

Answer:

d. Hard disk

Explanation:

The storage capacity of the given options are presented as follows;

[tex]\begin{array}{lr}Device& Storage \ Capacity\\ Digital \ versatile \ disc\ (DVD)& 4.7 \ GB\\ \begin {flushleft} Computer \ disc \ (CD)&703 \ MB\\Floppy \ disk & 2.8 \ MB\\Hard \ disk & 1,000 \ GB\end{array}\right][/tex]

Therefore, the device with the highest storage capacity from among the options is the hard disk with a storage capacity of 1,000 gigabytes of data

Sami needs to decide how the fonts, colors, and images will look on her new web site. Which will help her pian her design?
O Mockup
Rough draft
O Sketchbook
Storyboard

Answers

maybe a sketchbook:))))

Answer:

Your answer is D Storyboard

Explanation:

Storyboarding is a process where you plan how things will look on your website just as described.

plz help
In response to a line of code reading name = input(“What is your name?”), the user enters the word Joshi. What will be the variable name assigned to the data Joshi?
a.
input

b.
name

c.
one

d.
What is your name?

Answers

Answer:

name

Explanation:

name =

is an assignment to the variable called 'name'.

Answer:

b. name

Explanation:

Not sure what language this is, but it looks like input( ) is a function that displays whatever you pass in, and then gets the responding user input.

Therefore, when you assign the function to a variable named "name", whatever the user input is will be assigned to it.

var name;

name = input("What is your name?");

print(name); //This would print the user's input.

which memory can be removed from motherboard? RAM OR ROM?​

Answers

Answer:

RAM is random-access memory and it can be removed from the motherboard.

Feel free to mark as brainliest :D

What space is space surrounding the area around the main subject.

Answers

Answer:

Positive space refers to the subject or areas of interest in an artwork, such as a person's face or figure in a portrait, the objects in a still life painting, or the trees in a landscape painting. Negative space is the background or the area that surrounds the subject of the work.

Explanation:

- The emptiness around and between the shapes or forms are called the negative spaces or ground. We often call it the background but it is more than that.

Your cousin, a senior in high school, asks you to play a Jeopardy-style game with her to help prepare for her computer science exam next week. She gives you these two clues about a type of relational database key: No column values may be NULL, and columns may be combined to create a unique primary key. Which type of key is she referring to

Answers

Answer:

She is referring to composite primary key

Explanation:

Composite primary key comprises of several columns with each having column having its own individual uniqueness.  

In a composite primary, all columns need to have some value as none of them can be null. Also, these individual columns are grouped to get a unique value.  

When browsing using certain browsers, if a page is known to be malicious or using phishing techniques in the past a browser may display a _________ before allowing you to move forward. Select one: Red Flashing Lights Red X Warning Bell Warning Page

Answers

Answer:

the last option

warning page

Express 42 as a product  of its prime factor​

Answers

The only way to write 42 as the product
of primes.

Except to change the order of the factors is
2 × 3 × 7. We call 2 × 3 × 7 the prime factorization of 42.
The only way to write 42 as the product of primes (except to change the order of the factors) is 2 × 3 × 7. We call 2 × 3 × 7 the prime factorization of 42.

Data inconsistency is described as A. Lack of data sharing between DBMS and Data Warehouse B. Program data dependence C. Having duplicate data in multiple files D. Lack of data sharing between similar DBMS E. Different versions of the same data appear in different places

Answers

Answer:

Having Duplicate Data in Seperate Files

Explanation:

A conflicting data set happens when managerial changes to a data set in the exchange log disagree with data kept up in the data set's setup document. A DBMS is a way this can be forestalled. I hope I helped you!

What do you call a collection of pre-programmed commands and functions used in programs?
Choices
1.Widget
2.Function
3.Libary
4.Variable

Answers

The answer is number 3.libary

The mapping of a logical address to a physical address is done in hardware by the ________. A. memory address register B. memory-management-unit (MMU) C. relocation register D. dynamic loading register

Answers

Answer:

b. Memory-Management Unit

Explanation:

The hardware device called Memory-Management Unit is used for mapping logical address to its corresponding physical address.

You are an administrator with 550 devices to enroll into Intune. You choose to bulk enroll them. Which other software will you need to build the package necessary to bulk enroll the devices via USB or network location

Answers

Answer: Windows Configuration Designer (WCD)

Explanation:

The other software that will be needed to build the package which is vital in bulk enroll the devices through USB or network location is Windows Configuration Designer (WCD).

Windows Configuration Designer typically allows the configuration of several aspects of Windows devices such as Active Directory, Connect to WiFi, Device name, and install applications.

who invented the Bluetooth device​

Answers

Answer:

The Bluetooth standard was originally conceived by Dr. Jaap Haartsen at Ericsson back in 1994.

Explanation:

according to this website www.androidauthority.com/history-bluetooth-explained-846345/

Answer:

alexander - edg 2022

Explanation:

when can one say that certain product has value​

Answers

Answer:

We can say that a certain product has a value when it is sold on Market and if many people demands on it. Products are produced to satisfy our needs and wants.

Explanation:

thank me later

pls help
urgent questions please​

Answers

Answer:

1 - CLI

2- GUI

3-CLI

4- CLI

Q3.What are the hardware requirement of the multimedia system?

Answers

Answer:

• The processing unit

• The memory

• Universal Serial Bus (USB) Device

• Graphics Card and Graphical Processing Unit (GPU)

• Hard drive

• Monitor

• External storage and optical device

What is the error in the following line: (1)

age=int(input("Enter your age:")

Answers

Answer:

14

Explanation:

By limiting the number of times a person can use a type of software before registering as the authorized owner of that software, software firms are dealing with problems associated with:

Answers

Answer:

Software piracy.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

Furthermore, a proprietary software license avail end users the opportunity to install and use the software after agreeing to the terms of its license.

Software piracy can be defined as an act which typically involves the unauthorized use, duplications, or distribution of a software that is legally copyrighted or protected, without an express permission from the software manufacturer (owner).

Generally, software manufacturers (owners) deal with problems associated with software piracy by placing a limit on the number of times or durations that an end user is allowed to use a particular software before registering (subscribing) as the authorized owner of that software.

what is the correct way to write h1 tag

Answers

Answer:

[tex]\huge\boxed{\texttt{<h1> </h1>}}[/tex]

Explanation:

The h1 tag in HTML is used to create title-like text.

HTML stands for Hyper Text Markup Language, and is the most common programming language used for website creation with content that can be read.

Additionally, CSS (Cascading Style Sheets) is used for the design of a document, such as colors or designs that are on the website. JavaScript is used for scripting websites such as interactive features that can be used via JavaScript.

h1 is the most common use for a big title on a screen. For example, if you're writing an article, you might put the name of your article title in h1 to give it that title emphasis.

Any tags in HTML will open with <> and end with </>, replacing whatever is inside of those tags with the type of style you want. So, an h1 tag would work like this.

<h1> Hello there! </h1>

The <h1> starts the next string into the h1 format, and the </h1> tells it to stop parsing what's after into the h1 tag.

Hope this helped!

PLEASE HELP DUE IN 30 MINUTES NO LINKS PLEASE ​

Answers

Answer:

3

Explanation:

Answer:

Correct answer is C: Format Check

What is the first phase of game development?
OA
the concept phase
B.
the pre-production phase
O c.
the prototype phase
D.
the alpha phase
E.
the beta phase

Answers

Hello there! The answer is:

B. The Pre-Production Phase

When someone or a group of people are designing an app or game, they generally follow the rule of phases. Basically, if you don't know what this process is, sound effects, character designs, icons and the concept are discussed. This is the first phase of game development.

I hope I helped you!

Select all the correct answers.
Which THREE of the following are spreadsheets typically used for?

budgeting
scientific analysis
creating presentations
number formatting
computer programming

Answers

Answer:

number formatting,

scientific analysis computer programming

Answer number formatting,

scientific analysis computer programming

Explanation: its right

Select the correct answer.
Walden is looking at his company’s regional sales numbers. He needs a quick estimate of the total sales across regions. The numbers are confusing to read because of the trailing decimals. What function can Walden use to round the numbers to the nearest whole number?

A.
=ROUND(number)
B.
=ROUND(0)
C.
=ROUND(number, 0)
D.
=ROUND(1)
E.
=ROUND(number, 1)

Answers

Answer:

C. =ROUND(number, 0)

Explanation:

The ROUND function in MS Excel is used in rounding off numbers input in the function to a specified number of decimal places

The cell address containing the original number to be rounded off, or the original number is entered as the first argument of the function, while the second argument is the number of digits the original number is to be rounded to

In order to round to the nearest whole number, the second argument would be 0 which result in the removal of the numbers after the decimal place and rounding the last integer on the bases of the value of the number after the decimal point

Therefore, to round the original number to the nearest whole number, the function Walden should use is =ROUND(number, 0).

Other Questions
Evaluate 5v + w for v = 4 and w = 16. Show work. SITUACIN ECONMICA en el segundo gobierno de Belaunde You are an administrator with 550 devices to enroll into Intune. You choose to bulk enroll them. Which other software will you need to build the package necessary to bulk enroll the devices via USB or network location g has 25,000 shares of $10 par common stock outstanding and 12,500 shares of $100 par, 6.00% cumulative, nonparticipating preferred stock outstanding. Dividends have not been paid for the past two years. This year, a $350,000 dividend will be paid. What are the dividends per share payable to preferred and common, respectively help grade 10 math,,,????????????? A math recap workshop is provided to the first year students entering a city college. To evaluate the workshop effectiveness, a study is conducted as following: 20 students with similar math backgrounds are randomly selected for the study. Of the 20 students, 10 of them are selected to attend the workshop and the other 10 do not attend the workshop. After the workshop has taken place a test is given to all 20 students. What is the appropriate inference test to use in this situation lnea de tiempo de la historia de la msica A company's sales force makes 400 sales calls, with 0.25 probability that a sale will be made on a call. What is the probability that between 75 (inclusive) and 95 (inclusive) sales will be made? Enter your answer as a decimal value, rounded to 4 decimal places. How does the great gatsby by relate to the American dream How much greater will the area of the table represented by figure ABCD be than that of the table represented by figure JKLM? A. 6 square feetB. 19 square feetC. 27 square feetD. 40 square feet How many different permutations can be formed using all the digits in 012313?answers:60180360720 Give 2 specific examples of how the Scientific Revolution impacted life at that time AND YOUR LIFE right now.I ONLY HAVE 3 HOURS SO HURRY UPYOU CAN READ ABOUT IT ON BRITANNICA OR KHAN ACADEMYNO COPYING AND PASTING FROM OTHER WEBSITESNO COPYING OTHER ANSWERSNO VIRUSESNO ABSURD ANSWERSNO LINKS An envelope is 6 cm longer than it is wide. The area is 72 cm squared, find the length and the width. what qualification is needed for a successful candidate to be a naturalized citizen the model below can be used to find the quotient of 1/2 divided by 1/4 what's the quotient What is the common ratio of the geometric sequence below?-96, 48, -24, 12, -6... Why do you think French is spoken all over the world? never colonized African coutry Explain how an aquatic biome could consist of multiple ecosystems. Include at least two examples of ecosystems in your explanation. Wilcox, chief executive officer and chairman of the board of directors, owned 60 percent of the shares of Sterling Corporation. When the market price of Sterlings shares was $22 per share, Wilcox sold all of his shares in Sterling to Conrad for $29 per share. The minority shareholders of Sterling brought suit against Wilcox demanding a pro rata share of the amount Wilcox received in excess of the market price. a. What are the arguments to support the minority shareholders claim for a pro rata share of the amount Wilcox received in excess of the market price? b. What are the arguments to reject the minority shareholders claim for a pro rata share of the amount Wilcox received in excess of the market price? c. Which side should prevail?