1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liraira [26]
3 years ago
12

Alison discovers that a system under her control has been infected with malware, which is using a key logger to report user keys

trokes to a third party. What information security property is this malware attacking?
Computers and Technology
1 answer:
Bond [772]3 years ago
7 0

Mostly the spyware and malware protection for desktop and laptop or workstations are to protected with anti-virus regular updates. All workstation or desktop or laptops are to updated operating systems patches.

If any operating systems patched update to be schedule and checked regularly. Schedule scanning by virus scanner to be made for desktop and laptop or workstations in regular interval basis

There are third parties tools such as malware and ADWCLEANER are also available free scanner software through internet where end user can download and scanner so software will clean the malware.

Mostly end user do mistake keep the files in desktop. Most of the malware software will affect the desktop folder only.

It will also affect c:\users folder and register enter keys.

You might be interested in
What does Verizon child allow parents to do? My parents recently got the app and put it on my phone so I was wondering...
HACTEHA [7]
It allows them to turn on and turn off your internet; also if you were wondering incognito or any private browsing still countermeasures all devises they can use to access your history
4 0
3 years ago
Which is the full form of COPA​
Radda [10]

Answer:

<u>COPA full form or meaning is Computer Operator and Programming Assistant.</u>

5 0
3 years ago
Read 2 more answers
What is the current record holder for the fastest car in the world? What is the top speed of it? 100 points to whoever gets it c
olchik [2.2K]
It’s 257 mph

Hope this helps !!!!!
7 0
3 years ago
Read 2 more answers
What does a cascading style sheet resolve a conflict over rules for an element?
Margaret [11]
I Think The answer is d I hope it helps
4 0
3 years ago
In a __________, you are trying to find what others have prepared. With __________, you are trying to discover new patterns that
AveGali [126]

Answer:

<u>query,</u> <u>data mining </u>

Explanation:

A query can be explained as another term for question.

If one needs additional information from some other person, he might have ask to him. Queries are used for the retrieval of the information.

In other words, one tries to find what have been prepared by others.

Data mining can be explained as the process that allows to sort through a large set of data for the identification of patterns.

In this process of data mining, one tries to find out the new patterns that may not be known at all.

3 0
3 years ago
Other questions:
  • Jill needs to create a chart for technology club that shows what percentage of total students in the school play video games. Wh
    11·2 answers
  • Hybrid processors that can process 32 bits or 64 bits are known by what term?
    8·1 answer
  • Which of the following statements is false? a. Classes (and their objects) encapsulate, i.e., encase, their attributes and metho
    15·1 answer
  • A user reports that nothing happens when he or she attempts to print from the computer at his desk. This points to a possible pr
    11·2 answers
  • What type of analysis should be used to respond to the statement, "Let's cut advertising by $1000 repeatedly so we can see its r
    14·1 answer
  • The birthday problem is as follows: given a group of n people in a room, what is the probability that two or more of them have t
    15·1 answer
  • What are the four common tags used on webpages?
    11·1 answer
  • By the 1990s, ______________ technology enabled one person operating a desktop computer to control most—or even all—of these fun
    8·2 answers
  • An Excel file that contains one or more worksheets
    15·1 answer
  • How is the architecture converted into software code? Elaborate the steps its passes through with help of examples / Diagram.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!