FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
You receive an email in your inbox from your friend Sara. The title of the email is “this is so cool!” and inside the email is an attachment with an .exe extension.what should you do?
A
delete the email
B
click the attachment
C
run virus scan, then click the attachment
D
call sara to see if she sent you the mail.
Explanation: 

Detailed explanation-1: -The title of the email is “This is so cool!” and inside the email is an attachment with an .exe extension. What should you do? Call Sara to see if she sent you the email. You recently received a new workstation and need to properly secure it before browsing the Internet.

Detailed explanation-2: -Insiders are a particularly nasty threat to any organization’s cybersecurity because of the amount of access they’d have when working from within. Chief Goal: Work from within an organization to get around its cybersecurity framework.

Detailed explanation-3: -To: Field and Recipients Recipients are the people you are sending the email to. You will need to type the email address for each recipient. Most of the time you’ll add recipients to the To: field, but you can also add recipients to the Cc: and Bcc: fields.

Detailed explanation-4: -Keeping your computer secure helps you avoid malware and direct hacking attempts designed to steal your personal information.

There is 1 question to complete.