Which of the following mitigation techniques can help prevent a high-jacked IM user account resulting from a password-stealing Trojan?

A. Disable the ability to send files through the system.
B. Teach users never to share their account password.
C. Teach users never to share their account name.
D. Ensure that anti-malware software is installed and up to date on the user's computer.

D
Explanation: To prevent the high jacking of IM accounts resulting from a password stolen by a Trojan ensure that anti-malware software is installed and up to date on the user's computer.

Computer Science & Information Technology

You might also like to view...

Assume you have a class named Rabbit which has three attributes: Color, Name, and Breed. How would you create a new object named Bunny of the class Rabbit?

a. Declare Bunny As New Object b. Declare Bunny.Rabbit As New Class c. Set Bunny = Rabbit d. Declare Bunny As New Rabbit

Computer Science & Information Technology

A widely used method that detects Trojans is called ____________________. This is similar to reconciling your check register every month to verify that the number of deposits and withdrawals match your bank statement.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology