Answer:
The correct answer is A.
Explanation:
Vishing can be described as phishing but only using a mobile telephone, making the victim give up any personal information that could be used for identity theft etc.
Pharming is a process which redirects the traffic from a known and trusted website to another one where they perform the operation of stealing the personal information of the people.
The example given in the question falls into the category of "Spear Phishing" which is when the victim receive e-mails that look like they have been sent by a trusted and known individual. This way they are more likely to open the e-mail or click on the link in the e-mail and the phishing act has a higher chance of success.
I hope this answer helps.
Answer: Virtual desktop infrastructure
Explanation:
The virtual desktop infrastructure is the virtualization technology in which the host desktop OS (operating system) is in the centralized server of the data center. The virtual desktop infrastructure is also known as server based computing as it include the variation in the computing model such as client - server model.
The example of the virtual desktop infrastructure is wallpapers, toolbars, window and folder is the stored in the server remotely.
All the other options does not involve with this technology so that is why option (D) is correct.
Answer:
1. DLL Files.
2. System software repair.
3. Software configuration.
4. Human-computer interaction.
5. A graphical user interface (GUI).
Explanation:
1. DLL Files can become lost or damaged on a computer and prevent it from working correctly. These are important registry files used by various system softwares to perform specific tasks.
2. System software repair is a type of software you can run to help fix computer problems. Some examples are disk defragmenter, regedit, etc.
3. Software configuration means the process of setting up an application and selecting specific options. This is usually done in the settings section of a software application or program.
4. Human-computer interaction is the name of the discipline concerned with the design of optimal user interfaces.
5. A graphical user interface (GUI) is what users make use of to interact with graphical icons and other visual elements in order to accomplish tasks.
Answer:
b.Make every attempt to recover the data
Explanation:
If you have important data on your hard drive that is not backed up and your Windows installation is so corrupted you know that you must refresh the entire installation you should make every attempt to recover the data.