COMPUTER THREATS SECURITY
WHAT IS A HACKER
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
viruses and worms
|
|
Shoulder surfing
|
|
hardware theft
|
|
copy
|
Detailed explanation-1: -Use firewalls. Firewalls are another essential tool in defending networks against security threats. A firewall can help prevent unauthorized access to a network by blocking incoming traffic from untrusted sources.
Detailed explanation-2: -Trojan horse: A destructive program that pretends to be a useful application, but harms your computer or steals your information after it’s installed.
Detailed explanation-3: -Rootkit is a form of malware that provides the attacker with administrator privileges on the infected system, also known as “root” access. Typically, it is also designed to stay hidden from the user, other software on the system, and the operating system itself.
Detailed explanation-4: -4. What is the name of an application that appears to look like a helpful application but instead does harm to your computer? D. A Trojan horse might look like helpful software but will actually do harm to your computer.