Ask Question
18 March, 09:49

An is auditor reviewing a network log discovers that an employee ran elevated commands on his/her pc by invoking the task scheduler to launch restricted applications. this is an example what type of attack?

+1
Answers (1)
  1. 18 March, 10:16
    0
    I would say a cyber attack. since it is any kind of offensive act on a computer system including pc's that steals, alters or destroys confidential information and which is considered hacking a computer. Using the task scheduler to launch restrictive applications seems to qualify as such an attack since it is violating the restrictive applicatios.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “An is auditor reviewing a network log discovers that an employee ran elevated commands on his/her pc by invoking the task scheduler to ...” in 📗 Computers & Technology if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers