Ask Question
31 July, 01:23

An is auditor reviewing a network log discovers that an employee ran elevated commands on his/her pc by invoking the task scheduler to launch restricted applications. this is an example what type of attack?

+5
Answers (1)
  1. 31 July, 04:23
    0
    I would say a cyber attack. since it is any kind of offensive act on a computer system including pc's that steals, alters or destroys confidential information and which is considered hacking a computer. Using the task scheduler to launch restrictive applications seems to qualify as such an attack since it is violating the restrictive applicatios.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question ✅ “An is auditor reviewing a network log discovers that an employee ran elevated commands on his/her pc by invoking the task scheduler to ...” in 📘 Computers and Technology if you're in doubt about the correctness of the answers or there's no answer, then try to use the smart search and find answers to the similar questions.
Search for Other Answers