1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lilit [14]
3 years ago
6

A recent antivirus scan on a server detected a Trojan. A technician removed the Trojan, but a security administrator expressed c

oncern that unauthorized personnel might be able to access data on the server. The security administrator decided to check the server further. Of the following choices, what is the administrator MOST likely looking for on this server?
a. Trojan
b. spyware
c. adware
d. ransomware
Computers and Technology
1 answer:
BabaBlast [244]3 years ago
3 0

Answer:

B. Spyware

Explanation:

Spywares are silent software that steals sensitive information such as internet or company data, and other similar information. They are oftentimes unnoticed and supply stolen data to external users, data centers or advertisement companies.

Sophisticated spyware can go as far as installing software to manipulate your settings or use passwords on your behalf.

Even though the Trojan was detected in our scenario, The Trojan would have created a backdoor to allow spyware in. This spyware will not be easily noticed by the technician or the antivirus, however, it could be more devastating than the Trojan.

That is why the security administration expresses concern over a breach despite the removal of the Trojan.

You might be interested in
What is a computer ?​
Ivenika [448]

Answer:

Computer

Explanation:

Computer defines to an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.

4 0
3 years ago
Read 2 more answers
Which is the best budget motherboard for i3 8100
Nataly [62]
I3 8100 is e best budget
7 0
3 years ago
Why did Constantine establish a new capital of the Roman Empire in Byzantium?
mestny [16]

Answer:

Explanation:

For to stablish with more power his new empire based on christianity.

5 0
3 years ago
Read 2 more answers
For a line segment, show that clipping against the top of the clipping rectangle can be done independently of the clipping again
butalik [34]

Answer:

Explanation:

Solution is in the attached document.

3 0
3 years ago
Three uses for Auto Formatting in Word 2016.
sdas [7]

Answer

  1. Auto Numbering and billeting
  2. Auto paragraphing and  indenting
  3. automatically super-scripting and sub-scripting

Explanation

Auto formatting is a software commonly found in word processor such as word 2016 and it is designed to automatically change the appearance of the text. In numbering and bulletin this helps by generating numbers automatically and it makes it easier for the user when typing for does not need to keep on going through the menu bar for numbering. Same case on paragraphing and indenting.  Auto formatting also helps in automatically generating the superscript and subscript. This helps in saving time and also producing a decent and an appealing  work or document.

3 0
3 years ago
Other questions:
  • Evan accidentally entered an incorrect word when he was typing a document. Which keyboard shortcut should he use to undo the err
    5·2 answers
  • Which of these statements about the truck driving occupation in the U.S. are accurate?
    12·2 answers
  • Evaluate means having a preference for one thing over another in a way that's unfair.
    5·1 answer
  • Is Microsoft team voice lagging for people who use it I want to know I only want to know if you use it ok not if you don’t.
    6·1 answer
  • Would you rather be rich and unknown or famous and poor
    9·1 answer
  • Explain what the loop does and what the result of executing it will be.
    7·1 answer
  • Coding with Loops Worksheet
    12·2 answers
  • What is one example of the use of an infrared sensor?
    13·2 answers
  • ____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.
    15·1 answer
  • In which cipher method are values rearranged within a block to create the ciphertext?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!