Answer:
1. B
2. D
3. C
4. A
5. B
Explanation:
1. To check the integrity of your hard disk and fix various file system errors, the Windows utility which should be implemented is Check disk (Chkdsk). This utility is always used with the command line interface (CLI) with the command "chkdsk."
2. An event or action took place and it caused damage to data, hardware, software and processing capability of the computer. From the statement given, security risks are being described. Any event or action that is capable of causing a problem to a computer system is considered to be a security risk and should be prevented through the use of an appropriate utility software.
3. Virus is a software program that can infect, damage and disrupts the whole computer system.
4. To protect the whole computer system, the software utility which is needed is an Anti-virus.
5. To avoid losing valuable data to your computer, the most important thing to do is to regularly back-up your files.
Shut down your computer and try again.
Answer:
access the computer remotely
Explanation:
The best option would be to access the computer remotely. This allows you to remotely view the computer and control it from anywhere in the world. This allows you to take full control, analyze, and fix the problem that the individual is having without having to explain step by step to the user what they have to do. This can be accomplished through a direct IP connection or through a third-party software, which the user will need to have installed on their computer.
Answer and Explanation:
Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user to enter the network without being detected for a long period.
APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.
Some of the practical strategies for protection against APT are:
- Sound Internal Auditing
- Strong Password Accessing Policies
- Stringent policies for accessing any device
- Introduction and implementation of multi factor authentication
- Strong IDs and sound honeypot solutions
Answer:
Adobe Indesign.
Explanation:
Adobe indesign is a typesetting and desktop publishing application used to create posters, newspapers, flyers, brochures, magazines, presentations, book and ebook etc.
It is a package from the Creative cloud adobe system packages. It has predetermined templates for newspaper pages (if newpaper is to published), and plug-ins to further customize the the layout of the newspaper to be created or published.