1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lilit [14]
3 years ago
6

A recent antivirus scan on a server detected a Trojan. A technician removed the Trojan, but a security administrator expressed c

oncern that unauthorized personnel might be able to access data on the server. The security administrator decided to check the server further. Of the following choices, what is the administrator MOST likely looking for on this server?
a. Trojan
b. spyware
c. adware
d. ransomware
Computers and Technology
1 answer:
BabaBlast [244]3 years ago
3 0

Answer:

B. Spyware

Explanation:

Spywares are silent software that steals sensitive information such as internet or company data, and other similar information. They are oftentimes unnoticed and supply stolen data to external users, data centers or advertisement companies.

Sophisticated spyware can go as far as installing software to manipulate your settings or use passwords on your behalf.

Even though the Trojan was detected in our scenario, The Trojan would have created a backdoor to allow spyware in. This spyware will not be easily noticed by the technician or the antivirus, however, it could be more devastating than the Trojan.

That is why the security administration expresses concern over a breach despite the removal of the Trojan.

You might be interested in
In a paragraph of no less than 125 words, explain what netiquette is and how it improves efficiency and productivity in the work
Pani-rosa [81]

Netiquette actually means "Internet etiquette." Just like etiquette is a code of polite behavior in society, netiquette is a code of good behavior on the Internet. This includes several aspects of the Internet, such as email, sending memos, or basic communication regarding office task.

Now we should note that communication is not just a pivotal part of any organization, it is an integral part of any organization, without communication, an organization will suffer greatly. Communication is said to be effective when the receiver understands the message conveyed just as the sender wanted to,  having said that Netiquette improves efficiency and productivity in the workplace because it creates an avenue for efficient communication which includes clear instructions, fast message delivery, and proper explanation, and this bridges the gap between managers and employees even when they are miles apart. A clear message about a task makes it easier to carry out the said task, thereby resulting in high productivity in the workplace.

7 0
3 years ago
A poem for coduction
Nataly_w [17]
I don't know if you want a poem about conduction but if so here ya go

no matter how the heat
different temperatures meet
hot to cold how it's done
4 0
3 years ago
Read 2 more answers
if image size and resolution are the same, which file format, .jpg, .gif, .or .tiff, will give you the smallest file size?
dimaraw [331]
.jpg will be the smallest size
3 0
3 years ago
Read 2 more answers
Your computer sign-in screen is visible, but after you enter your sign-in credentials the computer fails to sign in and present
Step2247 [10]

Answer:

Shift key.

Explanation:

6 0
3 years ago
Which of the following options would enable you to block inheritance for a folder, retain all of the same permissions as the par
AfilCa [17]

Answer:

c

Explanation:

you have to open the file explorer and disable the inheritance permission on file folder, you will also have to access the security tab access advanced key and disable inheritance

6 0
3 years ago
Other questions:
  • Calls to the tostring( ) method emphasize the use of ____.
    12·1 answer
  • Which visual aid should Emil use to compare and contrast the political systems in three countries?
    13·1 answer
  • A user makes a request to implement a patch management service for a company. As part of the requisition the user needs to provi
    7·1 answer
  • i'm actually really smart so if u need help just ask me or leave me a comment. im 16 and my name is lexi
    8·2 answers
  • Why is the answer B?
    6·1 answer
  • Which procedure is used as a physical barrier to secure data against unauthorized access in a cloud storage data center?
    6·1 answer
  • 30 POINTS PLS HELP AND DONT PUT ANYTHING IF U DK PLS
    5·1 answer
  • Define a structure Triangle that contains three Point members. Write a function that computes the perimeter of a Triangle . Writ
    14·1 answer
  • Who can give me answer for this kinda urgent pls
    13·1 answer
  • a(n) is an object that defines a screen element used to display information or allow the user to interact with a program in a ce
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!