1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulsSmile [24]
3 years ago
9

A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f

ollowing types of malware is MOST likely installed on the compromised host?
A. Keylogger
В. Spyware
C. Trojan
D. Backdoor
E. Rootkit
Computers and Technology
1 answer:
Roman55 [17]3 years ago
8 0

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

You might be interested in
Describe the certifications developed by SANS. How are they different from InfoSec certifications like CISSP and SSCP?
Nat2105 [25]

Answer:

The certification developed by the SANS is GIAC certification .In this there are 3 certification GSEC,GISF and GCED .The description of these certification is given below .

Explanation:

The GIAC certification course is providing the knowledge of the security like cryptography ,networkig knowledge etc .

GSEC:The GSEC Certification is the certification of the security.It simply means this certification certified about the security risk in the computer system .

GISF: This certification gives the knowledge of the networking as well as the security in the computer system also it gives the knowledge of the cryptography.

GCED :This certification is also providing the knowledge of security as well as networking.

Difference between GIAC and  InfoSec certifications is given below

  • The SANS certification is giving the knowledge about the security risk as well as cryptography by the professional where as the InfoSec certifications providing the knowledge of the hacking by the professional .
  • The SANS is including the certification of  GIAC certification where as the InfoSec certifications is including the  CISSP and SSCP certification .
4 0
3 years ago
Which statement best describes one reason why assembly
posledela

Answer:

D. It allows programmers to write abbreviations instead of repeating calculations

7 0
2 years ago
In the circuit seen here, the resistor has a resistance of 3 ohms. If no change in the battery size occurs, what will happen to
Rufina [12.5K]

It will increase by a factor of 2

6 0
3 years ago
Read 2 more answers
What two protocols are used for remote access to a server, using unencrypted and encrypted transmissions respectively? answer
drek231 [11]
Telnet or rsh and ssh, http and https, ftp and sftp or ftps ? How are you accessing the server?
8 0
3 years ago
What are the pros and cons of cloud computing?
Arada [10]

Answer: Cloud computing is the technology that is based network on which the services are accessed with the help of hardware and software.Internet is platform through which the accessing of information, files and other services takes place.

The advantages of cloud computing are as follows:-

  • It acts as the flexible system
  • Cost efficient
  • Easy restoration and backing -up of data
  • Almost unlimited storage capacity

Disadvantages of cloud computing are:-

  • Technical problems can occur in network
  • It can be vulnerable to network attacks and hacking
  • Has some security issues

5 0
4 years ago
Other questions:
  • Using the ____ browsing mode offered by some browsers can prevent personal information from being left on a public computer.
    9·1 answer
  • Write the simplest statement that prints the following on a single line: 3 2 1 Go! Note: Whitespace (blank spaces / blank lines)
    11·1 answer
  • In the lecture, we saw that TCP waits until it has received three duplicate ACKs before performing a fast retransmit. Why do you
    10·1 answer
  • Main topics: Basic Java program
    11·1 answer
  • The use of computers in education is referred to as computer-assisted instruction (CAI). Write a program that will help an eleme
    9·1 answer
  • Define Indentation
    8·1 answer
  • The type of memory that stores data<br>Currently in used is called​
    8·2 answers
  • 11 Select the correct answer. Which external element groups items in a design?
    9·1 answer
  • Which of the expressions is false? when a = 10 and b = 4
    8·1 answer
  • A common business practice is to include a worksheet named Documentation that contains a description of the workbook, the name o
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!