Critical Thinking QuestionsCase 1-2John's new computer has started to perform oddly and he is concerned that it may have become infected with malware. He knows that you work for a company that produces antivirus software so he gives you a call to ask for advice.List at least six reasons you can give John for preventing viruses and other malware.
What will be an ideal response?
1. Never start a computer with removable media inserted in the drives or plugged in the ports, unless the media are uninfected.
2. Never open an e-mail attachment unless you are expecting it and it is from a trusted source.
3. Set the macro security in programs so that you can enable or disable macros. Enable macros only if the document is from a trusted source and you are expecting it.
4. Install an antivirus program on all of your computers. Update the software and the virus signature files regularly.
5. Scan all downloaded programs for viruses and other malware.
6. If the antivirus program flags an e-mail attachment as infected, delete or quarantine the attachment immediately.
7. Before using any removable media, scan the media for malware. Follow this procedure even for shrink-wrapped software from major developers. Some commercial software has been infected and distributed to unsuspecting users.
8. Install a personal firewall program.
9. Stay informed about new virus alerts and virus hoaxes.
10. Do not click links in e-mail messages.
11. Avoid navigating to unknown Web sites.
You might also like to view...
Bob sends Alice an encrypted message using AES. What key would Alice need to use to decrypt the message?
A. Bob's public key B. Bob's private key C. Alice's public key D. The same key that Bob used to encrypt the message
Your mother likes to draw. She has been scanning her drawings and putting them on her computer but would like a way to draw and edit the pictures on the computer. What peripheral type would you recommend for your mother?
A. Webcam B. Touchpad C. VR headset D. Graphics tablet
The main difference between a pure virtual function and a virtual function is:
a. The return type. b. The member access specifier. c. That a pure virtual function cannot have an implementation. d. The location in the class.
Local Security ________ and Group ________ both enable you to set software restriction policies (SRP) and application control policies
a. Definitions b. Containers c. Policy d. None of the above