COMPUTER THREATS SECURITY
TYPES OF COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Which action could be used to determine if a host is compromised and flooding traffic onto the network?
|
Examine the Device Manager on the host for device conflicts.
|
|
Unseat and then reconnect the hard drive connectors on the host.
|
|
Check the host hard drive for errors and file system issues.
|
|
Disconnect the host from the network.
|
Explanation:
Detailed explanation-1: -Which action could be used to determine if a host is compromised and flooding traffic onto the network? Disconnect the host from the network.
There is 1 question to complete.