Tim has removed a virus from a customer’s computer. The virus was a Trojan horse that the customer downloaded while trying to purchase software on the Internet.
?
What final step should Tim perform?
A. Schedule scans and run updates.
B. Disable System Restore in Windows.
C. Enable System Restore in Windows.
D. Educate the user.
Answer: D
You might also like to view...
Together, software design, implementation, and testing are important pieces of software engineering.
Answer the following statement true (T) or false (F)
Which of the following is not one of the “Five A’s” of information security?
A) Availability B) Assurance C) Authorization D) Authentication
We used the final version of the program in section 10.2.2. The following session shows the profile of the resulting program. The diagram below the session is the call graph for the executed program drawn in a pictorial form.
What will be an ideal response?
The _____ regulates how Web sites can collect information from minors and communicate with them.
A. ?Children's Online Privacy Protection Act B. ?Child Online Protection Act C. ?Children's Internet Protection Act D. ?Child Identity Theft Protection Act