1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anzhelika [568]
3 years ago
11

If you notice files being transferred to or from your computer a. Simply close the window c. Tell the lab instructor b. Open a n

ew Internet window d. Close the Internet session and tell the lab instructor Please select the best answer from the choices provided
Computers and Technology
2 answers:
a_sh-v [17]3 years ago
5 0

Answer:

The best answer is letter D.  

Explanation:

Downloading of files without your permission is a form of security threat and attack. You as unwilling victim will have your files and private information stolen.

One of the basics of internet security is to terminate any connection that you have in a network to stop the possible attack or threat. Worst case scenario is we can shut down our computers or devices or gadgets. But if we can just terminate the connection without performing a force shut down on the device, it is much better. This will give us more time to save what we are working on and to prevent losing important works or data. Terminating the connection from the network comes in various activities such as:  

*Disconnect from the internet - this is one of the most effective method. As most of the attacks are coming from external threats such a hacking.  

*Closing the browser - this could be helpful as well. Hackers are using browser to monitor their victims. And malwares and adwares are most active while we use browsers as they are embedded and using it to propagate to peform their activities.  

*Disconnect from the local network - if you have closed the internet connection and any active software that you are working on presently and the downloading of files still persists, probably the attack comes from your local network. You must close any connection that you have within the local network.

*Deleting the recent files you have downloaded - You must delete any recent files that you just downloaded from your email or from the internet. There might be malware embedded in the file. Malwares are used by hackers to get in to their victims computer without them knowing it.

Then after terminating all the connections, you must call on your Instructor's attention. He / She is the authority in charge and must be aware of the situation.

Contact [7]3 years ago
3 0

Answer:d. Close the Internet session and tell the lab instructor

Explanation:If you notice files being transferred to or from your computer it might be a malware attack in which a virus or worm is transferred to the host system in order to make copies of all the files present in the host system and these are transferred to the attacker through internet.

You might be interested in
How do ACLs work on a router?
serg [7]

Answer:

An ACL is a list of permit or deny rules detailing what can or can't enter or leave the interface of a router. Every packet that attempts to enter or leave a router must be tested against each rule in the ACL until a match is found. If no match is found, then it will be denied.

Explanation:

PLEASE MARK ME AS BRAINLIEST

6 0
3 years ago
Someone say crackhead
Ghella [55]

Answer:

................. crackhead

6 0
3 years ago
Read 2 more answers
What is copycat <br> i don't know it
Feliz [49]
A childish term for someone who copies others 
8 0
4 years ago
Read 2 more answers
How many generations of computers languages have there been since the middle of the 20th century
Molodets [167]
<span>There are 4 computer language generations. First is the first generation language or 1GL, second is the second-generation languages or the 2GL, next is the third-generation languages or the 3GL, and the last is fourth-generation languages or the 4GL.</span>
4 0
3 years ago
Read 2 more answers
In unix, the ________ permission allows the user to make changes.
mote1985 [20]
The write permission, specifically: -r--r--r-- changed to -rw-r--r--
6 0
4 years ago
Other questions:
  • _____ is the network protocol that deals with the routing of packets through interconnected networks to the final destination.
    9·1 answer
  • Why does hamlet want to kill himself and what stops him from doing that?
    10·1 answer
  • Which of the following would be an example of a loss of record integrity in a
    12·1 answer
  • You've been hired by Maple Marvels to write a C++ console application that displays information about the number of leaves that
    5·1 answer
  • Both instructions and data in a digital<br>computer are represented as binary<br>digits. True False​
    13·1 answer
  • All conduit must be strapped within __ feet of a pull box.
    14·1 answer
  • For what purpose power point is used?​
    5·2 answers
  • One difference between multi-tasking using fork() versus using threads is that there is race condition among threads due to shar
    5·2 answers
  • Why is internet download speed slower on a computer vs phone
    9·1 answer
  • What is the objective of Accenture‘s e-stewards program
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!