Critical Thinking QuestionsCase 1-2John's new computer has started to perform oddly and he is concerned that it may have become infected with malware. He knows that you work for a company that produces antivirus software so he gives you a call to ask for advice. List at least six reasons you can give John for preventing viruses and other malware.
What will be an ideal response?
1. Never start a computer with removable media inserted in the drives or plugged in the ports, unless the media are uninfected.
2. Never open an e-mail attachment unless you are expecting it and it is from a trusted source.
3. Set the macro security in programs so that you can enable or disable macros. Enable macros only if the document is from a trusted source and you are expecting it.
4. Install an antivirus program on all of your computers. Update the software and the virus signature files regularly.
5. Scan all downloaded programs for viruses and other malware.
6. If the antivirus program flags an e-mail attachment as infected, delete or quarantine the attachment immediately.
7. Before using any removable media, scan the media for malware. Follow this procedure even for shrink-wrapped software from major developers. Some commercial software has been infected and distributed to unsuspecting users.
8. Install a personal firewall program.
9. Stay informed about new virus alerts and virus hoaxes.
You might also like to view...
The ________ Rule property is used to check values for accuracy as they are entered into a table
A) Reliable B) Integrity C) Consistent D) Validation
A label on a form is an example of a(n) ________ control
A) bound B) range C) unbound D) trigger
Which Windows command will copy encrypted files?
A. copy B. robocopy C. xcopy D. move
In WEP, RC4 uses a(n) ____________________ to create the keystream.
Fill in the blank(s) with the appropriate word(s).