Answer: A. CRYPTO-MALWARE
Explanation: Crypto-malware is a type of ransomware that blocks the uses from accessing the computer system,it also encripts all the files.
This type of ransomware is mainly used to demand for ransom.
This type of ransomware which makes use of sophisticated and advanced ransomware technology to ensure that encripting must be with a unique Key or password,the hijacked system is used for crypto mining without the owns consent.
True. I think we should trust ourselves and interaction with someone including teachers, classmates and parents...We must be developing our critical thinking skills.
Answer:
B.
Explanation:
Based on the scenario it can be said that in order to efficiently work with Samantha on her laptop during the project, Pam should export her settings to a file for Samantha to import. Doing so will make sure that both individuals have the exact same platform to work on and will make communicating changes and ideas a lot easier and more efficient.
Answer:
C. TCP port 443.
Explanation:
TCP (transmission control protocol) is a connectiod oriented protocol, that is unlike UDP (user datagram program) it needs a connection between the source and destination to be successful. Port numbers are used with ip addresses to specify packets meant for a given application.
The tcp 443 represents the HTTPs protocol, used to request and get packets from a remote and secure web server.
With this protocol and port number "TCP 443", a system can request a secure remote access to another system in a data center.