1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
3 years ago
15

In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for

attempted logon retries.
Computers and Technology
1 answer:
Alex787 [66]3 years ago
6 0

Answer:

False

Explanation:

If your server has been hacked, accessed by Remote access domain, these are tips or recommendations:

- Disable the Remote Desktop service on the affected computer and close port 3389 on the router so that your server is not accessible by Remote Desktop from the Internet, as another hacker can re-access and encrypt more files or encrypt over those already encrypted. .

- Ensure that the virus is not active, to do this place some files to see if they are encrypted or not.

- Scan the server with an updated antivirus.

- Open Task Manager, view active processes, and end the encryption process, which is usually Payload.exe

- Change the passwords of all users of the computer.

- Install a good paid antivirus, we recommend these:

- Configure the antivirus with password protection, so hackers cannot uninstall or deactivate it.

- You can use a desktop blocking program such as Eusing Maze Lock.

- Use a network firewall and VPN connection to remotely access the computer.

- Never use direct connection by Remote Desktop without VPN.

- Set up an online backup or an appropriate backup policy.

You might be interested in
Evan is borrowing a friend's laptop to check out some groovy music files. What can Evan look for to quickly identify
Yuki888 [10]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct option for this question is the file extension. Because, by knowing the file extension, you can easily understand and know what the file is. If Evan checking out some groovy music files then he will definitely look at the file format to know that is it the music file or not.

Other options are not correct because:

messaging app function is to send the message, receive and store the message while hardware does not have any relation to identifying the music file and system software is an example of an operating system that also does not help the Evan for looking at music file on the laptop.

7 0
3 years ago
Cameras absorb and record the reflected light from objects through a series of lenses. true or false? PLEASE HELP ASAP
mylen [45]

Answer:

True

Explanation:

Cameras absorb and record the reflected light from objects through a series of lenses, which are similar to the lenses that might be in someone's glasses

7 0
3 years ago
Read 2 more answers
Why internet is helpful for ICT?​
insens350 [35]

Explanation:

Information & Communication Technology is an extended term for Information Technology. That stresses the role of unified communication & integration of telecommunications & computers as well as enterprise software, middleware, storage & audiovisual, that enables users to access, store, transmit & manipulate information. The term ICT is used to refer to the convergence of audio-visual & telephone networks with computer networks through single cabelling or link systems.

All the things that are happening nowadays are with the help of the Internet. From shopping, meetings, messaging, video conferencing, news and many more are happening just in single touch within a fraction of seconds you will know what's happening in the corner of the world, around the world, beyond the planet, you can communicate with anyone you want, you can purchase from where ever you want. This Internet has made this huge world like a small apple.

4 0
3 years ago
How do you change the name on your brainly account?
serg [7]

Answer:

For changing your username you can contact to administrator of the site. If you are using app then go to message option. Then search "rishilaugh" then you can message him. Hope it helps you!

8 0
4 years ago
HELP ME !!!!!!!
ra1l [238]

Answer:

C. Protocol Identifier

3 0
3 years ago
Other questions:
  • Assume that a gallon of paint covers about 350 square feet of wall space. Create an application with a main() method that prompt
    9·1 answer
  • Why isn't my brainly camera working? I got Brainly Plus and can't even scan questions. I've logged out, I've uninstalled and rei
    14·1 answer
  • Write down the three part of a computer.<br>​
    7·1 answer
  • What city, the major financial center of its country, is located on the northern coast of the island where the poet who wrote "A
    8·2 answers
  • Select the correct statement(s) regarding a Network Access Point (NAP), also known as an Internet Exchange Point (IXP). a. At a
    12·1 answer
  • Which changes the natural world? <br> technology <br> science <br> prototypes <br> feedback
    5·1 answer
  • In which situation would Accenture apply principles of Responsible Artificial Intelligence (AI)?
    9·1 answer
  • Please help me i’ll give you brainlist
    13·1 answer
  • What does playstation network is currently undergoing maintenance?.
    15·1 answer
  • What are tasks performed by pascaline?​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!