COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Trojan Horses
A
Does not need to attach to a program
B
Can only occur when a computer is not connected to a network
C
A type of social engineering
D
Designed to access a computer by misleading users of its’ intent by prompting to download a program
Explanation: 

Detailed explanation-1: -Sending requests to a single server using hijacked machines (1-3) Phishing.

Detailed explanation-2: -Certified Ethical Hacker (CEH).

Detailed explanation-3: -A firewall is a network security device that monitors incoming and outgoing network traffic. It is the first line of defense in cybersecurity and acts as a barrier between a private and trusted network and an untrusted source (such as the Internet).

There is 1 question to complete.