Which of the following mitigation techniques can help prevent a high-jacked IM user account resulting from a password-stealing Trojan?

A. Disable the ability to send files through the system.
B. Teach users never to share their account password.
C. Teach users never to share their account name.
D. Ensure that anti-malware software is installed and up to date on the user's computer.


D
Explanation: To prevent the high jacking of IM accounts resulting from a password stolen by a Trojan ensure that anti-malware software is installed and up to date on the user's computer.

Computer Science & Information Technology

You might also like to view...

When an object, such as a String, is passed as an argument it is __________.

a. actually a reference to the object that is passed b. passed by value like any other parameter value c. encrypted d. necessary to know exactly how long the string is when writing the program

Computer Science & Information Technology

Which of the following states does not have security breach law?

A. Alabama B. Texas C. California D. Massachusetts

Computer Science & Information Technology

FIGURE EX 7-1 The arrow shown in the accompanying figure is pointing to where you would ____.

A. attach a copy of the workbook to an email B. type a comment C. sign in to Windows Live D. save a file as a PDF

Computer Science & Information Technology

An access control program is required for:

A. internal personnel B. visitors C. contractors D. A, B, and C E. none of the above

Computer Science & Information Technology