1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lilit [14]
2 years ago
6

A recent antivirus scan on a server detected a Trojan. A technician removed the Trojan, but a security administrator expressed c

oncern that unauthorized personnel might be able to access data on the server. The security administrator decided to check the server further. Of the following choices, what is the administrator MOST likely looking for on this server?
a. Trojan
b. spyware
c. adware
d. ransomware
Computers and Technology
1 answer:
BabaBlast [244]2 years ago
3 0

Answer:

B. Spyware

Explanation:

Spywares are silent software that steals sensitive information such as internet or company data, and other similar information. They are oftentimes unnoticed and supply stolen data to external users, data centers or advertisement companies.

Sophisticated spyware can go as far as installing software to manipulate your settings or use passwords on your behalf.

Even though the Trojan was detected in our scenario, The Trojan would have created a backdoor to allow spyware in. This spyware will not be easily noticed by the technician or the antivirus, however, it could be more devastating than the Trojan.

That is why the security administration expresses concern over a breach despite the removal of the Trojan.

You might be interested in
Which type of approach grew out of the development of computers, where even complex behavior such as learning, remembering, cate
mestny [16]

Answer:

In studies of technology and innovation, it is common to distinguish between different levels of technology. A common distinction is between technologies as processes or products and technology systems. Another distinction is between technology s hardware, software and orgware; sometimes socioware is added as yet another layer or category. In he studies, the focus is usually on a particular technology, either a process technology or product

Ž echnology with product technology broadly de In studies of technology and innovation, it is

common to distinguish between different levels of technology. A common distinction is between technologies as processes or products and technology. Another distinction is between technology as hardware, software and orgware; sometimes socioware is added as yet another layer or category. In the studies, the focus is usually on a particular technology, either a process technology or product.  

Explanation:

7 0
3 years ago
When you write a check, why do you always begin writing the amount of the check as far to the left as you can?
Ivenika [448]

Answer:

You start at the left without leaving any paces so no one can add any more numbers.

Explanation:

5 0
3 years ago
8. SQL, Oracle Report, and Visual Basic are all examples under the
sleet_krkn [62]

SQL, Oracle Report, and Visual Basic are all examples under the generation.

<h3>Fourth generation languages</h3>

Fourth-generation programming language (4GL) are computer programming language based on the advancement on third-generation programming languages (3GL).

4GLs may include support for <em>database management, report generation, mathematical optimization, GUI development, web development.</em>

SQL, Oracle Report, and Visual Basic are all examples under the generation.

Find out more on Fourth generation languages at: brainly.com/question/9325849

3 0
2 years ago
What does AU stand for in computer?
SpyIntel [72]

Answer:

AU stands for <em>Audio Units.</em>

7 0
2 years ago
What is network topology​
Fynjy0 [20]
DescriptionNetwork topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial fieldbusses and computer networks.
3 0
3 years ago
Other questions:
  • If an ARQ algorithm is running over a 40-km point-to-point fiber optic link then:
    12·1 answer
  • How to build an arch bridge​
    5·1 answer
  • Malcolm is part of a team developing a new smartphone app to track traffic patterns. Because team members are located throughout
    12·1 answer
  • What two programming systems uses numbers and text?
    6·1 answer
  • An adiabatic capillary tube is used in some refrigeration systems to drop the pressure of the refrigerant from the condenser lev
    15·1 answer
  • Java can be used to create which of the following technologies?This task contains the radio buttons and checkboxes for options.
    5·1 answer
  • When the code that follows is executed, a message is displayed if the value the user entersvar userEntry = (prompt("Enter cost:"
    11·1 answer
  • During which geologic era was nearly all of Earth's land concentrated into one giant mass called Pangaea?
    6·1 answer
  • Sam’s password is known to be formed of 3 decimal digits (0-9) in a given order. Karren and Larry are attempting to determine Sa
    9·2 answers
  • Hey everyone. I am so bored
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!