Topics
Products
Follow Us:

Computer Security Questions and Answers (Q&A)

John Smith
Answered: Jun 03, 2020
It performs tasks on your computer without your consent and control.

1 Answer

325 views
John Adney
Answered: Nov 30, 2016
In computing,Trojan horse, orTrojan, is any malicious computer program which is used to hack into a computer by misleading users of its true intent.

3 Answers

286 views
John Smith
Answered: Jun 03, 2020
B-d-a-c

The correct ensure us to scan our file each time we use pendrive in the computer.

1 Answer

281 views
E.Susan
Answered: Apr 23, 2018
Black hat Hackers. Like all hackers,have a broad learning about breaking into PC networks and bypassing securities. They are likewise in charge of composing malware, which is a technique used to...Read More

3 Answers

270 views
John Adney
Answered: Dec 07, 2017

YES, A trojan Horse is a virus that is disguised until the user does soething that makes it break out and do damage to the computer.

1 Answer

247 views
Adamaschun
Answered: Jun 03, 2020
Report it as phishing/spam through your email provider

Deleteing the message is an option, but reporting the message as phishing makes your email provider alert to the scams that are...Read More

1 Answer

244 views
Tzander
Answered: Jun 03, 2020
A server that retrieves data from host servers before sending it to a computer

Proxy servers act as middlemen for the Internet. They retrieve Web pages and send them to computers, which...Read More

1 Answer

235 views
Mike John, Content Explorer
Answered: Jun 04, 2017
Recommended to refresh a full sandbox after a major production release.

1 Answer

223 views
Adamaschun
Answered: Jun 03, 2020
Write down a hint that only makes sense to you and keep it secure.

Never write down passwords, even if you intend to put them somewhere safe they can fall into the wrong hands.

1 Answer

212 views
John Smith
Answered: Jun 03, 2020
An encrypted value

A hash or hash value is a string of characters that represent encrypted data. You create a hash value by running data through a hashing algorithm.

1 Answer

212 views
John Smith
Answered: Jun 03, 2020
Lock the computer with a password

Even if you shut down the computer, someone could restart it and have access to your personal information unless you passowrd protect the computer.

1 Answer

210 views
John Smith
Answered: Jun 03, 2020
Train and educate the people within the team, especially the help desks

1 Answer

202 views
Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.