Ask Question
30 March, 12:40

An is auditor reviewing a network log discovers that an employee ran elevated commands on his/her pc by invoking the task scheduler to launch restricted applications. this is an example what type of attack?

+4
Answers (1)
  1. 30 March, 13:12
    0
    I would say a cyber attack. since it is any kind of offensive act on a computer system including pc's that steals, alters or destroys confidential information and which is considered hacking a computer. Using the task scheduler to launch restrictive applications seems to qualify as such an attack since it is violating the restrictive applicatios.
Know the Answer?
Not Sure About the Answer?
Get an answer to your question ✅ “An is auditor reviewing a network log discovers that an employee ran elevated commands on his/her pc by invoking the task scheduler to ...” in 📙 Computers & Technology if there is no answer or all answers are wrong, use a search bar and try to find the answer among similar questions.
Search for Other Answers