COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
heistware
|
|
theftware
|
|
extortionware
|
|
Ransomware
|
Detailed explanation-1: -Trojan horse: A destructive program that pretends to be a useful application, but harms your computer or steals your information after it’s installed.
Detailed explanation-2: -Macro Virus This type of virus is commonly found in programs such as Microsoft Word or Excel. These viruses are usually stored as part of a document and can spread when the files are transmitted to other computers, often through email attachments.
Detailed explanation-3: -If you notice any or all these symptoms, your computer might have a virus and you should act: Suddenly slow computer performance, meaning it takes a noticeably longer time to start up or open programs. Problems unexpectedly shutting down or restarting. Missing files.
Detailed explanation-4: -What type of software is used to circumvent normal security processes on a computer? A. A backdoor is an attempt to avoid normal security mechanisms. A backdoor can be assimple as using the default password if it wasn’t changed, or it can be a malware program.