1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liraira [26]
3 years ago
12

Alison discovers that a system under her control has been infected with malware, which is using a key logger to report user keys

trokes to a third party. What information security property is this malware attacking?
Computers and Technology
1 answer:
Bond [772]3 years ago
7 0

Mostly the spyware and malware protection for desktop and laptop or workstations are to protected with anti-virus regular updates. All workstation or desktop or laptops are to updated operating systems patches.

If any operating systems patched update to be schedule and checked regularly. Schedule scanning by virus scanner to be made for desktop and laptop or workstations in regular interval basis

There are third parties tools such as malware and ADWCLEANER are also available free scanner software through internet where end user can download and scanner so software will clean the malware.

Mostly end user do mistake keep the files in desktop. Most of the malware software will affect the desktop folder only.

It will also affect c:\users folder and register enter keys.

You might be interested in
How would you "break" a firewall in a laptop computer if you were no longer a administrator? (Cyber Security Related, Computers
4vir4ik [10]
Okay so what you would is press ctrl+alt+delete and click log out i think but if you have a disk put it in and secure everything trust me i am a computer savage. i hack thing all the time.

6 0
3 years ago
Write a program that reads a file name from the keyboard. The file contains integers, each on a separate line. The first line of
Sindrei [870]

Answer:

Explanation:

import java.util.Scanner;

import java.io.*;

public class ArrayProcessing

{

public static void main(String[] args) throws IOException

{

Scanner kb = new Scanner(System.in);

String fileName;

System.out.print("Enter input filename: ");

fileName = kb.nextLine();

File file = new File(fileName);

if(!file.exists())

{

System.out.println("There is no input file called : " + fileName);

return;

}

int[] numbers = inputData(file);

printArray(numbers);

}

public static int[] inputData(File file) throws IOException

{

Scanner inputFile = new Scanner(file);

int index = 1;

int size = inputFile.nextInt();

int[] values = new int[size];

while(inputFile.hasNextInt() && index < values.length)

{

values[index] = inputFile.nextInt();

index++;

}

inputFile.close();

return values;

}

public static void printArray(int[] array)

{

int count = 1;

for (int ndx = 1; ndx < array.length; ndx++)

{

System.out.printf("%5.f\n", array[ndx]);

count++;

}

if(count == 10)

System.out.println("");

}

}

4 0
3 years ago
In Windows applications, a ____ control is commonly used to perform an immediate action when clicked.a. text boxb. buttonc. wind
AleksandrR [38]

Answer:

Option b. button

Explanation:

Button control is one of the most common user controls in Windows application to enable user perform an immediate action when clicked. We can see there might be more than one button controls in a single Window application and each of them can be used to trigger different specific action.

For example, button control can be created to perform a "Submit" or "Login", or "Calculate" action in Windows application. The button click event will trigger a corresponding action to meet a specific purpose.

7 0
3 years ago
Which statement is true with respect to java bytecode is platform independent
Rom4ik [11]

Answer:

e with respect to java bytecode is platform indepee with respect to java bytecode is platform indepee with respect to java bytecode is platform indepee with respect to java bytecode is platform indepee with respect to java bytecode is platform indepee with respect to java bytecode is platform indepe

Explanation:

e with respect to java bytecode is platform indepee with respect to java bytecode is platform indepee with respect to java bytecode is platform indepee with respect to java bytecode is platform indepee with respect to java bytecode is platform indepee with respect to java bytecode is platform indepee with respect to java bytecode is platform indepee with respect to java bytecode is platform indepee with respect to java bytecode is platform indepee with respect to java bytecode is platform indepee with respect to java bytecode is platform indepee with respect to java bytecode is platform indepee with respect to java bytecode is platform indepee with respect to java bytecode is platform indepee with respect to java bytecode is platform indepe

4 0
2 years ago
Data source contains addresses of the merge fields. true or false​
Dafna11 [192]

answer is

true

Explanation:

wer are you from

6 0
3 years ago
Other questions:
  • What is the name of the feature that can be enabled on slower-speed WAN links to prevent a large data transfer from affecting th
    10·1 answer
  • Which of the following statements is true? Methods and instance variables can both be either public or private. Information hidi
    11·1 answer
  • Controlled intersections use some form of which of the following:
    7·1 answer
  • A pointing device controls the movement of the ____.
    15·1 answer
  • If it is impractical to place guest users in a secure network, isolated from the production network by firewall barriers, then:
    14·1 answer
  • PLEASE HELP!!! THIS IS WORTH A TEST GRADE!!!
    13·1 answer
  • What is communication barriers?​
    6·2 answers
  • Anyone from qls<br><br>or grax here<br><br>in bs​
    13·1 answer
  • What’s cloud-based LinkedIn automation?
    14·1 answer
  • What is the database and presentation for files​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!