Answer: trojan horse virus
Explanation:A trojan horse is a non-replicating program that looks legitimate, but it is actually used to perform malicious and illicit activities when launched. Attackers use trojan horses to steal a user's
personal information like password information, or they may simply use it to destroy programs or data on the hard disk.
Answer:
True
Explanation:
Portion Markings encompasses a necessary features such as the subject, title, paragraphs, sub-paragraphs, sections, tabs, attachments, the classified signature block, bullets, tables, and even pictures.
Under the current E.O. 13526, the standard markings are required for all documents that contain originally classified information and marking elements listed above.
Answer:
The answer to this question is a. Event log
Explanation:
Event log in Windows is a comprehensive record of security,system and application notifications stored by the Windows and it is used by administrators to determine problems in the system and foretell issues that going to happen in future.
Operating system and the Apps use event logs to keep account of important software and hardware activity that administrator can use to correct issues with the operating system.
Answer:
Repetition.
Explanation:
hope it helps u
can u mark me as brainliest