Which of the following mitigation techniques can help prevent a high-jacked IM user account resulting from a password-stealing Trojan?
A. Disable the ability to send files through the system.
B. Teach users never to share their account password.
C. Teach users never to share their account name.
D. Ensure that anti-malware software is installed and up to date on the user's computer.
D
Explanation: To prevent the high jacking of IM accounts resulting from a password stolen by a Trojan ensure that anti-malware software is installed and up to date on the user's computer.
You might also like to view...
When an object, such as a String, is passed as an argument it is __________.
a. actually a reference to the object that is passed b. passed by value like any other parameter value c. encrypted d. necessary to know exactly how long the string is when writing the program
Which of the following states does not have security breach law?
A. Alabama B. Texas C. California D. Massachusetts
FIGURE EX 7-1 The arrow shown in the accompanying figure is pointing to where you would ____.
A. attach a copy of the workbook to an email B. type a comment C. sign in to Windows Live D. save a file as a PDF
An access control program is required for:
A. internal personnel B. visitors C. contractors D. A, B, and C E. none of the above