Answer:
Phishing
Explanation:
Phishing is one of the most common social engineering attacks in which the attacker disguises to be a trustworthy personnel in order to lure the victim or target into disclosing sensitive information such as passwords, credit card details and so on.
Phishing could be carried out via emails, telephones, or even text messages.
In this case, the attacker pretends to be an IT tech in order to get your computer configuration details which he can then use to carry out some other fraudulent acts.
Another example is in the case of someone receiving an email from their bank requesting that they need to update their records and need the person's password or credit card PIN.
Answer:
The question is incomplete and should read as follows:
Victoria is working on a computer that was infected with a virus when a client clicked on a link and downloaded a Trojan. Victoria researched the virus and learned that the virus might have written itself into System Restore. What does Victoria need to do to run the antivirus software on System Restore?
This issue can be fixed by taking the following steps:
A. Disable System Protection.
B. Back up the restore point.
C. Enable System Protection.
D. Run the antivirus software on a restore point.
The system is then restored to the now clean restore point to rid the computer completely of the virus.
Explanation:
Answer:
See explaination
Explanation:
Looking at telecommunications network, a link is a communication channel that connects two or more devices for the purpose of data transmission. The link is likely to be a dedicated physical link or a virtual circuit that uses one or more physical links or shares a physical link with other telecommunications links.
Please check attachment for further solution.
Answer:
c. a group of compromised computers connected to a network that attacks other networks
Explanation:
<em>Botnets </em>refer to a group of computers controlled from a single source in which software programs are run. Botnets can be used for several purposes, such as scientific (SETI), or computing corporate purposes; on the other hand, botnets are also used for illegal purposes, for instance hacker run malicious programs in order to attack other networks.
Answer:
c)both a and b
Explanation:
If the tires are under inflated the the rolling resistance increases due to more surface are of tire now touches the ground hence there is more friction.Since the rolling resistance increases the tire will face difficulty in turning hence the steering the tires will become more hard.Since rolling resistance is increased so the engine has to work more to run the car hence it will consume more fuel.