COMPUTER NETWORKING

NETWORK SECURITY

INTERNET SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
David always opens all attachments hereceives with his email. This is notrecommended because some attachmentsmay
A
contain malware
B
contain advertising material
C
require special programs to open
D
require to be printed to be read.
Explanation: 

Detailed explanation-1: -Most viruses, Trojan horses, and worms are activated when you open an attachment or click a link contained in an email message. If your email client allows scripting, then it is possible to get a virus by simply opening a message. It’s best to limit what HTML is available in your email messages.

Detailed explanation-2: -EXE files Executables-or .exe. files-are one of the most common types of malware. You will often download .exe files over the internet when installing legitimate software.

Detailed explanation-3: -Any script or malware can be hidden in an email attachment, which then allows attackers to gain access to networks, steal confidential data, and carry out other malicious actions. Once the email attachment has been opened by its recipient, it can be used to spread spyware, adware, worms, or even botnets.

Detailed explanation-4: -Text files. .txt. This type is generally harmless. Image files. .jpg. The extension . Compressed files. .zip/.rar. Compressed files can contain viruses that become active as soon as you extract them. Audio files. .mp3. Video files. .mpg/.mpeg/.avi/.wmv/mov/.ram. Executable files. .exe.

There is 1 question to complete.