1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lilit [14]
3 years ago
6

A recent antivirus scan on a server detected a Trojan. A technician removed the Trojan, but a security administrator expressed c

oncern that unauthorized personnel might be able to access data on the server. The security administrator decided to check the server further. Of the following choices, what is the administrator MOST likely looking for on this server?
a. Trojan
b. spyware
c. adware
d. ransomware
Computers and Technology
1 answer:
BabaBlast [244]3 years ago
3 0

Answer:

B. Spyware

Explanation:

Spywares are silent software that steals sensitive information such as internet or company data, and other similar information. They are oftentimes unnoticed and supply stolen data to external users, data centers or advertisement companies.

Sophisticated spyware can go as far as installing software to manipulate your settings or use passwords on your behalf.

Even though the Trojan was detected in our scenario, The Trojan would have created a backdoor to allow spyware in. This spyware will not be easily noticed by the technician or the antivirus, however, it could be more devastating than the Trojan.

That is why the security administration expresses concern over a breach despite the removal of the Trojan.

You might be interested in
Anyone play Ro-blox ? without the -
Olin [163]
I do! I know it says high school but I lied :)
6 0
3 years ago
Read 2 more answers
The following characteristics are common to the majority of cloud environments, except: 1. on-demand usage 2. resiliency measure
irga5000 [103]

Answer: 4. Availblitliy is not a major characteristic.

Explanation:

-Manufacturing organization can provide additional computing resources without going through the cloud service provider.

-Multi-tenancy allows multiple customers to share the same applications/the same physical infrastructure while retaining privacy and security over their information.

-Cloud computing resources usage is metered and organizations pay accordingly for what they have used.

-Elasticity is a landmark of cloud computing and it implies that organizations can rapidly provision and de-provision any of the cloud computing resources.

4 0
4 years ago
Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m
liberstina [14]

Answer:

A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology

Explanation:

3 0
2 years ago
A field value is currently not in any group. what happens when you try adding it to an existing group?
ivann1987 [24]

When a  field value is currently not in any group,  What happens when you try adding it to an existing group is that It is removed from the "all" list, and placed under its new group.

<h3>What is a  field value?</h3>

The value of a field  can be described as the  string of bytes,  which do contains  all bytes in the field after the first colon.

The field value function is is useful in a case whereby extraction of the field data from linked data types is needed.

It is a good method thst used when writing formulas that refer to data types, and that is why the field value do help the user when creating a conditional calculations using a linked data types.

It also gives the enablement in the extraction of the exact values from the cell linked to data types.

It should be noted that this field value is  concatenation of all the lines  found in the the field, outside the  starting name and colon, hence When a  field value is currently not in any group,  What happens when you try adding it to an existing group is that It is removed from the "all" list, and placed under its new group.

Find out more on field value at brainly.com/question/843074

#SPJ1

6 0
1 year ago
Match the item to the type.
I am Lyosha [343]

Answer:

a. hardware - 3. motherboard

b. software - 2. Microsoft Word

c. input device - 4. mouse

d. operating system - 1. windows

7 0
3 years ago
Read 2 more answers
Other questions:
  • When federal courts are evaluating digital evidence from computer-generated records, what exception is applied to hearsay?'
    13·1 answer
  • What is Diigo? <br>What is Diigo?
    14·1 answer
  • Briefly explain five measures you have undertaken to protect your confidential
    12·1 answer
  • How to find out if your Mac has been hacked
    12·1 answer
  • The refresh or reload button is in the browser toolbar and usually looks like a pair of curved arrows. Clicking it will ________
    14·2 answers
  • ____ assigns a risk rating or score to each information asset. Although this number does not mean anything in absolute terms, it
    8·1 answer
  • How do you turn a .bat file into a .exe file, running the same code? I want to publish something on the internet without everyon
    10·1 answer
  • The February Revolution occurred in January.<br><br><br> True<br> False
    5·2 answers
  • Which of the following factors is most likely to result in low shipping and handling costs? A higher than average hourly pay rat
    10·2 answers
  • How do you flatten a 2D array to become a 1D array in Java?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!