171k views
0 votes
An is auditor reviewing a network log discovers that an employee ran elevated commands on his/her pc by invoking the task scheduler to launch restricted applications. this is an example what type of attack?

1 Answer

5 votes
I would say a cyber attack.since it is any kind of offensive act on a computer system including pc's that steals, alters or destroys confidential information and which is considered hacking a computer. Using the task scheduler to launch restrictive applications seems to qualify as such an attack since it is violating the restrictive applicatios.
User GargantuChet
by
7.9k points
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.