Answer:
D- Trojan Horse
Explanation:
Trojan horse is a malware that has hidden code and look legitimate in order to damage or transfer harmful action on the computer.
Example hackers can disguise as Trojan horse by spying on the victims computer in order to gain access to sensitive data on the computer over the network.
Answer:
Option C
Explanation:
The type of illustration used by Rachael to add a new organizational chart is SmartArt Graphic.
In this tool, the information or data or ideas a person uses in the project are represented visually.
The different layout choices like organizational charts, etc enables a person to select the one that fits the information provided in the project.
Some are design to convey particular form of messages or information while the others are used for simple purposes like highlighting the appearance of texts or bullets.
Enabling encryption of all data that are stored on a desktop or laptop computer is generally considered: essential for any computer.
<h3>What is information security?</h3>
Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.
<h3>The types of security control.</h3>
In Cybersecurity, there are three (3) different types of security control and these include the following:
In this context, we can infer and logically deduce that the use of encryption, endpoint security, firewalls, intrusion detection systems (IDS), and biometric fingerprint readers is generally considered essential for any computer that stores data, unless they aren't sensitive information.
Read more on information security here: brainly.com/question/14286078
#SPJ4