COMPUTER THREATS SECURITY
WHAT IS A HACKER
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
use a trojan horse to find the password
|
|
Use a password cracker to find the password
|
|
use social engineering to find the password
|
|
delete and reinstall the server
|
Detailed explanation-1: -Trojan horse: A destructive program that pretends to be a useful application, but harms your computer or steals your information after it’s installed.
Detailed explanation-2: -As part of an organization’s security and data protection program, it should have a plan in place that, at minimum, mitigates risk to systems and networks arising from four common types of malicious software: trojans, spyware, viruses, and ransomware.
Detailed explanation-3: -Types of cyber threats your institution should be aware of include: Malware. Ransomware. Distributed denial of service (DDoS) attacks.
Detailed explanation-4: -Rootkit is a form of malware that provides the attacker with administrator privileges on the infected system, also known as “root” access. Typically, it is also designed to stay hidden from the user, other software on the system, and the operating system itself.