Answer & Explanation:
No Browsing History:
- Your browser is probably set to incognito mode, change it to general mode.
- space set on your drive to save the content from your browser might be completely filled, Make sure you have given your browser enough space on your drive to save contents.
- The number of days to record the history in your browser is set to 0, Check the settings and make sure it is not set to 0.
Phishing Scam
- Change all the credentials on the site that you have disclosed.
- Immediately report the mail to an IT department and necessary authorities.
- Mark the mail as span and block the mail id.
Suspicious File Attachment
- May be that the suspicious file contains a virus file. Often such viruses are attached to external "Show-case" files so that the victim is not able to identify them. Once the external file is tried to open, the virus slips into the main memory (your RAM) and start executing in the background, creating copies of itself and executing every copy. Soon they start eating up the main memory (The memory that runs all your programs) making your PC slow to respond.
Antivirus Software Outdated
- Connected to the Internet and update the antivirus.
Laptop's Physical Security
- Set a password.
- install a tracking software.
"Restore", or in Spanish, "Restaurar".
Answer:
Defense in Depth (DiD).
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Defense in Depth (DiD) can be defined as a concept or framework in cyber security that typically involves the process of layering multiple defensive mechanisms and security control throughout an information technology (IT) system, so as to prevent data theft or an unauthorized access to user data.
Basically, this cyber security technique is designed such that when a layer of the defensive mechanism fails, another security layer step in to mitigate and prevent the attack. Thus, it causes redundancy when an attacker exploits a vulnerability in a system, a breach of security or when one of the security layers fail.
Explanation:
Given, the cost price of the TV is Rs 24600. Now, the cooler costs Rs 800 more than one-third of the TV. The cost price of the cooler is Rs 9000.
Answer:
C. empathic understanding