NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Trojan horse
|
Does not need to attach to a program
|
|
Can only occur when a computer is not connected to a network
|
|
A type of social engineering
|
|
Designed to access a computer by misleading users of its’ intent by prompting to download a program
|
Explanation:
Detailed explanation-1: -Antivirus software keeps the system secure by automatically blocking pop-ups and spam coming from malicious websites.
Detailed explanation-2: -The Computer Misuse Act attempts to discourage people from using computers for illegal purposes. There are three separate parts to the Act: It is illegal to access data stored on a computer unless you have permission to do so. Unauthorised access is often referred to as hacking .
There is 1 question to complete.