Explain malicious email attachments.
What will be an ideal response?
Another common means of distributing attacks is through email attachments, or files that are sent with an email message. email-distributed malware will often take advantage of information contained on the user's computer. For example, malware can replicate by sending itself as an email attachment to all of the contacts in a user's email address book. The unsuspecting recipients, seeing that an email and attachment arrived from a "friend," typically with a provocative subject line, open the attachment and infect their computers.
You might also like to view...
A(n) ____________________ is a tiny dot of light that, when taken together, form a grid on your screen to create images.
Fill in the blank(s) with the appropriate word(s).
Samantha is having an issue with Windows crashing and believes that malicious software is causing it to crash. Samantha also has received application errors that have cause the applications to close. Which event log in the Event Viewer can Samantha inspect to see if malicious software is causing the Windows system to crash and the application errors, system errors, and other types of errors?
A. System logs B. Security logs C. Setup logs D. Application
____________________ is a skill level in which a trainee has gone beyond basic skills to be able to perform a task effectively and efficiently.
Fill in the blank(s) with the appropriate word(s).
At the top of the DNS server hierarchy are the ____ servers that publish a directory of the next level of DNS servers.
A. local caching B. authoritative C. root name D. namespace