1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lilit [14]
3 years ago
6

A recent antivirus scan on a server detected a Trojan. A technician removed the Trojan, but a security administrator expressed c

oncern that unauthorized personnel might be able to access data on the server. The security administrator decided to check the server further. Of the following choices, what is the administrator MOST likely looking for on this server?
a. Trojan
b. spyware
c. adware
d. ransomware
Computers and Technology
1 answer:
BabaBlast [244]3 years ago
3 0

Answer:

B. Spyware

Explanation:

Spywares are silent software that steals sensitive information such as internet or company data, and other similar information. They are oftentimes unnoticed and supply stolen data to external users, data centers or advertisement companies.

Sophisticated spyware can go as far as installing software to manipulate your settings or use passwords on your behalf.

Even though the Trojan was detected in our scenario, The Trojan would have created a backdoor to allow spyware in. This spyware will not be easily noticed by the technician or the antivirus, however, it could be more devastating than the Trojan.

That is why the security administration expresses concern over a breach despite the removal of the Trojan.

You might be interested in
Plz can someone tell me the answers ?
Ganezh [65]

Answer:

you can

Explanation:

you can

5 0
3 years ago
Read 2 more answers
Which Ribbon contains the paragraph attributes?<br><br> Home<br> Insert<br> Review<br> View
Lemur [1.5K]
The Home ribbon contains the Paragraph attributes
7 0
3 years ago
Read 2 more answers
Los elementos de la comunicación técnica son el medio, el código y el contenido, ¿Esta información es falsa o verdadera?
LenaWriter [7]

la respuesta es verdadera

Explanation:

V

7 0
3 years ago
The name atari comes from what
algol [13]

Answer:

JAPANESE

Explanation:

Have a nice day:)

3 0
3 years ago
How does an Ac Machine work
Pani-rosa [81]

Answer:

In a split system, the compressor condenses and circulates the refrigerant through the outdoor unit, changing it from a gas to a liquid. The liquid is then forced through the indoor evaporator coil or cooling compartment. The indoor unit's fan circulates the inside air to pass across the evaporator fins.

Explanation:

(hope this helps)

6 0
3 years ago
Other questions:
  • 1.
    13·1 answer
  • What is the easiest way to be sure you have selected all of the content related to a specific tag?
    11·1 answer
  • A computer system has a 32KB, 8-way set associative cache, and the block size is 8 bytes. The machine is byte addressable, and p
    7·1 answer
  • What do developers do to support software products
    14·1 answer
  • In JAVA please:
    15·1 answer
  • What can cause a Lenovo computer to be very slow right after after turning it on?
    14·1 answer
  • Where are the results from the Advanced Find feature displayed?
    6·1 answer
  • What software application is most appropriate to use to create multimedia presentations?
    6·2 answers
  • Candy Kane Cosmetics (CKC) produces Leslie Perfume, which requires chemicals and labor. Two production processes are available:
    14·1 answer
  • True or False? Security code is almost always open source!<br> True<br> False
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!