FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which action could be used to determine if a host is compromised and flooding traffic onto the network?
A
Examine the Device Manager on the host for device conflicts.
B
Unseat and then reconnect the hard drive connectors on the host.
C
Check the host hard drive for errors and file system issues.
D
Disconnect the host from the network.
Explanation: 

Detailed explanation-1: -Which action could be used to determine if a host is compromised and flooding traffic onto the network? Disconnect the host from the network.

There is 1 question to complete.