COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Trojan horse
A
Does not need to attach to a program
B
Can only occur when a computer is not connected to a network
C
A type of social engineering
D
Designed to access a computer by misleading users of its’ intent by prompting to download a program
Explanation: 

Detailed explanation-1: -Antivirus software keeps the system secure by automatically blocking pop-ups and spam coming from malicious websites.

Detailed explanation-2: -The Computer Misuse Act attempts to discourage people from using computers for illegal purposes. There are three separate parts to the Act: It is illegal to access data stored on a computer unless you have permission to do so. Unauthorised access is often referred to as hacking .

There is 1 question to complete.