Which of the following is/are step(s) to help prevent computer infiltration by malicious software?
1. Users should never share or use their password on public unsecured devices.
2. Users should install a virus scanning program and regularly update it.
3. Users should refrain from updating their computers with security patches.
4. Users should be careful when opening e-mail file attachments and refrain from downloading applications from unknown sources.
a. 1 only
b. 1 and 2 only
c. 1, 2, and 4 only
d. 1, 2, 3, and 4
ANS: C
Users can take steps to help prevent computer infiltration by malicious software by doing the following: Users should never share or use their password on public unsecured devices. Users should regularly update their computers with security patches from authorized sources; Users should install a virus scanning program and regularly update it. Most importantly, users should be careful when opening e-mail file attachments and refrain from downloading applications from unknown sources.
You might also like to view...
Hippocrates stressed the body's healing nature, formed clinical descriptions of diseases, and discovered the ability to identify some diseases by listening to the chest.
Answer the following statement true (T) or false (F)
A 10-year-old who has been hit on his bicycle can be treated by Emergency Medical Respond-
ers if he is alert enough to give expressed consent. Indicate whether the statement is true or false
When determining the mechanism of injury, you will identify:
A) the forces involved in the accident. B) the number of patients. C) the need for additional resources. D) the person who caused the accident.
The custom-fabricated type of mouth guard is formed after submersion in boiling water.
Answer the following statement true (T) or false (F)