What is it called when you obtain administrative privileges from a normal user account quizlet?

Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and steal data through a VPN connection using the credentials assigned to a vice president in your organization.

For security reasons, all individuals in upper management in your organization have unlisted home phone numbers and addresses. However, security camera footage from the vice present's home recorded someone rummaging through her garbage cans prior to the attack. The vice president admitted to writing her VPN login credentials on a sticky note that she subsequently threw away in her household trash. You suspect the attacker found the sticky note in the trash and used the credentials to log in to the network.

You've reviewed the vice president's social media pages. You found pictures of her home posted, but you didn't notice anything in the photos that would give away her home address. She assured you that her smart phone was never misplaced prior to the attack.

Which security weakness is the most likely cause of the security breach?

Recommended textbook solutions

Fundamentals of Engineering Economic Analysis

1st EditionDavid Besanko, Mark Shanley, Scott Schaefer

215 solutions

Chemistry for Engineering Students

2nd EditionLawrence S. Brown, Thomas A. Holme

945 solutions

Advanced Engineering Mathematics

10th EditionErwin Kreyszig

4,134 solutions

Introduction to Chemical Engineering Thermodynamics

7th EditionHendrick Van Ness, J.M. Smith, Michael Abbott

582 solutions

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (30)

True/False: iOS was developed by and continues to be maintained by a consortium of companies.

False

True/False: A setting called airplane mode lowers the output power of the Wi-Fi and Bluetooth antennas allowing these networks to function, but at a reduced range.

False

True/False: Releases of Android are named after animals, such as Lion, Leopard, or Puma.

False

True/False: The act of jailbreaking a phone was once illegal, but was made legal by the U.S. Copyright Office and the Library of Congress.

True

The iOS operating system utilizes a closed-source, or vendor specific / commercial license.

True

What company acquired Android code in 2005 and has a leadership role in its development?
Apple; Symbian; Google; Yahoo

Google

What must you do before using a new iPad or iPod touch?
register it; activate it; install iOS on it; install iTunes on it

activate it

What does jailbreaking do?
Allows you to download games for free from Google Play; Allows you to download music for free from iTunes; give you administrative privileges to Android; give you root privileges to iOS

give you root privileges to iOS

A SIM card is used to which of the following?
holding data related to your cellular carrier; holding your iTunes music information; controlling the sensitivity of your touch screen; backing up your data and applications

holding data related to your cellular carrier

What is the accelerometer used for in mobile devices?
adjusting the screen orientation; geotracking; sychronizing data; locating the nearest cell tower

adjusting the screen orientation

What component on a smart phone requires pairing with another device?
GPS; Wi-Fi; Bluetooth; SIM card

Bluetooth

What can you do if you want to obtain administrator privileges to an Android device?
delete the normal user account; logon as Admin; root the device; reboot into recovery mode

root the device

Outgoing mail is normally sent using what mail delivery protocol?
SMTP; IMAP4; POP3; SSL

SMTP

What port is utilized by secure IMAP (IMAPS)?
110; 143; 995; 993

993

What is the more secure alternative to the SMTP mail protocol?
SMTP; IMAP; POP; S/MIME

S/MIME

How much storage is offered by iCloud Drive for no cost?
5 GB; 10 GB; 20 GB; 100 GB

5 GB

What identifies a SIM card if the card is used?
IMEI; IMSI; ICCID; ICCEI

ICCID

Siri is an example of what technology?
app backup software; virtual assistant; virtual container; mobile application wizard

virtual assistant

Applications on the Android OS are mostly written in what programming language?
PHP; Objective-C; Java; Python

Java

All parts of an Android application are published as a package of files wrapped into one file utilizing what file extension?
.zip; .img; .iso; .apk

.apk

A Bluetooth PIN code requires the entry of a PIN that is how many digits in length?
4; 6; 8; 12

4

What unique number is used to identify each mobile phone or tablet device worldwide?
IMSI; IMEI; ICCID; MAC address

IMEI

What name is given to the Windows Phone 8.1 virtual assistant?
Spartan; John; Cortana; Chief

Cortana

Where is the Favorites tray on an Android device?
above the Action Bar; in the Notifications window; under Chrome settings; on the Google Play screen

above the Action Bar

What mobile operating system is the Fire OS used by Amazon's Kindle Fire devices based on?
Symbian; BlackBerry OS; Java Micro Edition; Android

Android

What software programming languages can be used for an iOS app?
Objective-C; C; C++; Java

Objective-C; C; C++

Which devices utilize an operating system based on the Mac OS X operating system?
iPhone; iPad; iPod touch; Samsung Galaxy

iPhone; iPad; iPod touch

What two U.S. carriers offer a feature called Wi-Fi calling?
AT&T; Sprint; T-Mobile; Verizon

Sprint; T-Mobile

What are the names of the application stores for iOS and Google Android devices respectively?
iOS AppDrive; App Store; Google Store; Google Play

App Store; Google Play

Most new Android devices are shipping with what version of Android?
Froyo; Gingerbread; KitKat; Lollipop

KitKat; Lollipop

Sets with similar terms

Chapter 16 - Hardware Support A+

25 terms

Klayton_Kertz

Chapter 16 - Supporting Mobile Operating Systems

55 terms

ohs-pctech

CH 16

55 terms

Sneakamex

Chapter 16 Key Terms

55 terms

doriblue42

Other sets by this creator

Hardware Chapter 15

31 terms

Aashu_Gurung

Chapter 12: Supporting Customers and Troubleshooti…

49 terms

Aashu_Gurung

A+ Guide to Software Chapter 1

43 terms

Aashu_Gurung

A+ Guide to Software (9th Edition) - Chapter 1

67 terms

Aashu_Gurung

Verified questions

COMPUTER SCIENCE

Write a program that alters the behavior of a Parent class using the concept of overriding.

Verified answer

COMPUTER SCIENCE

Create a class called Crayon that represents one crayon of a particular color and length (height). Design and implement an applet that draws a box of crayons.

Verified answer

COMPUTER SCIENCE

You are given an infinite array $A[\cdot]$ in which the first n cells contain integers in sorted order and the rest of the cells are filled with $\infty.$ You are not given the value of n. Describe an algorithm that takes an integer x as input and finds a position in the array containing x, if such a position exists, in O (log n) time. (If you are disturbed by the fact that the array A has infinite length, assume instead that it is of length n, but that you don’t know this length, and that the implementation of the array data type in your programming language returns the error message $\infty$ whenever elements A[i] with i > n are accessed.)

Verified answer

COMPUTER SCIENCE

Write list functions that carry out the following tasks for a list of integers. For each function, provide a test program. a. Swap the first and last elements in the list. b. Shift all elements by one to the right and move the last element into the first position. For example, 1 4 9 16 25 would be transformed into 25 1 4 9 16. c. Replace all even elements with 0. d. Replace each element except the first and last by the larger of its two neighbors. e. Remove the middle element if the list length is odd, or the middle two elements if the length is even. f. Move all even elements to the front, otherwise preserving the order of the elements. g. Return the second-largest element in the list. h. Return true if the list is currently sorted in increasing order i. Return true if the list contains two adjacent duplicate elements. j. Return true if the list contains duplicate elements (which need not be adjacent).

Verified answer

Recommended textbook solutions

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

720 solutions

Operating System Concepts

9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin

489 solutions

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Other Quizlet sets

social studies quaterly exam

12 terms

ya_castro169

SPM quizzes Dr. Petersen

45 terms

tylerthomas020

Module 7. More about Objects

17 terms

croque18

Airplane Instruments, Engines, and systems

90 terms

Megan_Schittenhelm4

What does John the Ripper single crack mode the default mode do?

What does John the Ripper's single crack mode, the default mode, do? Incremental mode in John will run an attack in which it will try every possible password within specified parameters, meaning John will generate the passwords.

What type of exploit would you use for a privilege escalation quizlet?

Using a web shell an attacker can perform privilege escalation by exploiting local system vulnerabilities. After escalating the privileges, an attacker can install malicious software, change user permissions, add or remove users, steal credentials, read emails, etc. Disable the default local administrator account.

What are two advantages of using a rootkit?

A rootkit allows someone to maintain command and control over a computer without the computer user/owner knowing about it. Once a rootkit has been installed, the controller of the rootkit has the ability to remotely execute files and change system configurations on the host machine.

What would you use the program Rtgen for quizlet?

Rtgen is used to generate the rainbow tables that rcrack will use to crack passwords.

Toplist

Neuester Beitrag

Stichworte