1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Doss [256]
3 years ago
13

Why is updating your anti-virus a good thing?

Computers and Technology
1 answer:
vladimir2022 [97]3 years ago
7 0

Answer:

Antivirus vendors play a 'cat and mouse' game with malware creators. As malware is discovered definitions are written to discover the program and other programs written in a similar way. If an existing piece of malware is extensively rewritten or a new piece of malware is created, the existing malware definitions are unlikely to detect the program as malicious. This means that antivirus vendors have to find a 'sample' of the new malware being used and create a new definition for it. When you update your anti-virus these malware definitions are downloaded allowing your antivirus to detect this newer malware and keeps your computer secure from these newer threats.

You might be interested in
Kelly has always used "P4ssw0rd” as her password on her online accounts. Why should she change this? Check all that apply.
const2013 [10]
Answer 1, 2, and 3 are all correct. Hope this helps
6 0
4 years ago
Read 2 more answers
A computer emergency response team is called at midnight to investigate a case in which a mail server was restarted. After an in
ANEK [815]

<u>Answer</u>:   B. Identify the source of the active connection

<em>Any problem can be fixed only finding of the source of it. We can fix a problem in ‘n’ number of ways but it might again come back if source of it is not identified.</em>

<u>Explanation:</u>

Identify the source of the active connection is the NEXT step the team should take. It is very similar to our human body.

If the infection is coming in the body again and again and gets fixed in the treatment, the reason for come - back will be identified so that it does not <em>lead to unnecessary treatment. </em>

In a similar way, if source are identified then the problem of come-back can be avoided. <em>So option B would be the right choice.</em>

4 0
4 years ago
Select the correct answer from each drop-down menu.
Fofino [41]
I think it’s 1, 2 and if im wrong im sorry
4 0
3 years ago
Recently, from around june through september 2022, a social engineering campaign, attributed to a nation-state group, has been u
Archy [21]

The commonly attributed name of the threat actor is called ZINC. A wide range of social engineering campaigns using weaponized legitimate open-source software by an actor tracked as ZINC.

ZINC weaponizing a wide range of open-source software including PuTTY, KiTTY, TightVNC, Sumatra PDF Reader, and muPDF/Subliminal Recording software installer for these attacks.

Who is ZINC?

ZINC is a nation-state activity group that is highly operational, destructive, and sophisticated. Active since 2009, the activity group gained public attention in 2014 after a successful attack on Sony Pictures Entertainment. ZINC is known to employ a number of custom remote access tools (RATs), including those identified by Microsoft as FoggyBrass and PhantomStar.

ZINC seeks to coerce employees of companies it is attempting to infiltrate into installing seemingly benign programs or opening weaponized documents containing malicious macros.

To know more about Open Source Software(OSS), visit: brainly.com/question/4593389

#SPJ4

5 0
1 year ago
Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m
liberstina [14]

Answer:

A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology

Explanation:

3 0
2 years ago
Other questions:
  • Which statement is true about customizing presentation programs?
    6·1 answer
  • _____ is the unauthorized entry into a computer system via any means
    9·1 answer
  • FREE POINTS JUST ANSWER MY LATEST TWO QUESTIONS PLEASE
    10·2 answers
  • How to find out if your Mac has been hacked
    12·1 answer
  • What is an icon?
    6·1 answer
  • How do different frequencies (color) of light affect a recorded video image?
    12·1 answer
  • Write a method that computes the average of the values in an array of doubles. The header of the method is as follows:
    14·1 answer
  • How to transfer word 2019 from one computer to another
    12·1 answer
  • What type of software repairs or improves a larger application that is already installed on a system?
    9·2 answers
  • Can anyone tell me about Microsoft some important features for partical
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!