If you determine that a Trojan program has been installed and is initiating a connection to a remote host and you suspect passwords have been compromised, what steps should you take? List three of them.
What will be an ideal response?
Block the connection.
Locate and eradicate the Trojan program.
Determine how the intrusion occurred.
Change network passwords.
Possibly change the way users safeguard their passwords.
Computer Science & Information Technology
You might also like to view...
To count words, click the Word Count indicator on the Home tab to display the Word Count dialog.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Gridlines display within and outside the document margins
Indicate whether the statement is true or false
Computer Science & Information Technology
An administrator user cannot grant rights to themselves.?
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A favicon is a graphic file 16 pixels in width by ____ pixels in height.
A. 16 B. 32 C. 64 D. 128
Computer Science & Information Technology