COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
you have been asked to lead a class on preventing social engineering. what topic should you be sure to cover?
A
viruses and worms
B
Shoulder surfing
C
hardware theft
D
copy
Explanation: 

Detailed explanation-1: -Scan your device for malware. Run a malware or security Delete anything it identifies as a problem. You may have to restart your device for the changes to take effect. Run your scan again to make sure everything is clear. If the scan shows there are no more issues, you’ve likely removed the malware.

Detailed explanation-2: -Many programs scan for malware using a database of known malware definitions (also called signatures). These definitions tell what the malware does and how to recognize it. If the anti-malware program detects a file that matches the definition, it’ll flag it as potential malware.

Detailed explanation-3: -Threat 1: Tailgating. Threat 2: Theft of documents. Threat 3: Unaccounted visitors. Threat 4: Stolen identification. Threat 5: Social engineering. Measure, mitigate and monitor your organisation’s human cyber risk.

There is 1 question to complete.