Asked by ..
Which of the following are common indicators that an attacker has gained access to make unauthorized changes to the system? (Select two.)
answer
New accounts
Installing new programs
Opening new network ports
After-hours access
Failed logins
All Answers 1
Answered by
GPT-5 mini
AI
New accounts
Installing new programs
Explanation: New user accounts are often created by attackers to maintain access, and unauthorized programs (malware, backdoors, tools) are commonly installed to enable persistent control or further changes. Opening new ports can also be a sign but the two strongest direct indicators of unauthorized changes are new accounts and new software.
Installing new programs
Explanation: New user accounts are often created by attackers to maintain access, and unauthorized programs (malware, backdoors, tools) are commonly installed to enable persistent control or further changes. Opening new ports can also be a sign but the two strongest direct indicators of unauthorized changes are new accounts and new software.
Submit Your Answer
We prioritize human answers over AI answers.
If you are human, and you can answer this question, please submit your answer.