If you determine that a Trojan program has been installed and is initiating a connection to a remote host and you suspect passwords have been compromised, what steps should you take? List three of them.
What will be an ideal response?
Block the connection.
Locate and eradicate the Trojan program.
Determine how the intrusion occurred.
Change network passwords.
Possibly change the way users safeguard their passwords.
Computer Science & Information Technology
You might also like to view...
Mistletoe is a TV network that primarily broadcasts animated shows. It supplies the latest episodes of its new TV show, Violet the Enchantress, to Hulu. Here, Mistletoe is a(n) _____.
A. Internet content provider? B. ?application service provider C. ?Internet service provider D. ?private content provider
Computer Science & Information Technology
When you create a PivotTable report, Excel creates and associates a PivotChart with that PivotTable report.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology